The Personal Health Information Act (PHIA) Access and Privacy Office

Similar documents
HIPAA Training

PRIVACY BREACH MANAGEMENT POLICY

I. Researcher Information

Reporting and Investigating Privacy Breaches and Complaints Approval: Original Signed by R. Cloutier. Date: September 2017

Protecting Patient Privacy It s Everyone s Responsibility

Student Orientation: HIPAA Health Insurance Portability & Accountability Act

Privacy and Security For Teammates

Chapter 9 Legal Aspects of Health Information Management

Compliance with Personal Health Information Protection Act

Health Information Privacy Policies and Procedures

Information Privacy and Security

Updated FY15 Dignity Health General Compliance Education for Staff Module 2

Study Management PP STANDARD OPERATING PROCEDURE FOR Safeguarding Protected Health Information

HIPAA Privacy Training for Non-Clinical Workforce

MANITOBA GOVERNMENT INVENTORY OF PERSONAL INFORMATION SYSTEMS WORKSHEET. Here are a few important pointers to help you fill out the Worksheet:

DUTIES OF A CUSTODIAN

MCCP Online Orientation

AN OVERVIEW OF FIPPA for FACULTY, INSTRUCTORS & ADMINISTRATORS. Information and tips on how to keep you FIPPA FRIENDLY

CLINICIAN S GUIDE TO HIPAA PRIVACY

WHAT IS HIPAA? HIPAA is the ELECTRONIC transmission of Three programs have been enacted to date Privacy Rule April 2004

HIPAA PRIVACY DIRECTIONS. HIPAA Privacy/Security Personal Privacy. What is HIPAA?

Applicants from Diploma, Degree, and Certificate Health Care Programs Supplementary Application Form

A Deep Dive into the Privacy Landscape

The Privacy & Security of Protected Health Information

Dr. Kristin Heins, ND Thrive Natural Family Health 110 Eglinton Avenue East, Suite 502 Toronto, Ontario M4P 2Y1 Telephone: (647)

Privacy and Management of Health Information

Advanced HIPAA Communications and University Relations

REVIEWED BY Leadership & Privacy Officer Medical Staff Board of Trust. Signed Administrative Approval On File

What is your start date? (Date in which you plan to begin seeing patients in the hospital). Specialty SECTION I. IDENTIFICATION DATA

STEP BY STEP SCHOOL. Data Protection Policy and Privacy Notice

Getting Ready for Ontario s Privacy Legislation GUIDE. Privacy Requirements and Policies for Health Practitioners

DATA PROTECTION POLICY

Technology Standards of Practice

HIPAA. Health Insurance Portability and Accountability Act. Presented by the UMMC Office of Integrity and Compliance

Policy Number: Disclosure of Personal. Health Information to Police Approval Signature: Original signed by A. Wilgosh.

HIPAA Education Program

GDPR Records Management Policy

HIPAA Health Insurance Portability and Accountability Act of 1996

THE PRIVACY ACT AND THE AUSTRALIAN PRIVACY PRINCIPLES FREQUENTLY ASKED QUESTIONS

FREEDOM OF INFORMATION AND PROTECTION OF PRIVACY A. 38

Breach Reporting and Safeguarding PHI Outpatient Services August, UAMS HIPAA Office Anita Westbrook

Compliance Program, Code of Conduct, and HIPAA

HIPAA and HITECH: Privacy and Security of Protected Health Information

IVAN FRANKO HOME Пансіон Ім. Івана Франка

A general review of HIPAA standards and privacy practices 2016

PRIVACY POLICIES AND PROCEDURES

East Carolina University 2010 Annual HIPAA Privacy Training

Mandatory Reporting and Breach Notification Changes to PHIPA and what you need to know

Privacy Toolkit for Social Workers and Social Service Workers Guide to the Personal Health Information Protection Act, 2004 (PHIPA)

UNDERSTANDING OUR CODE OF CONDUCT...4 OUR RELATIONSHIP WITH THOSE WE SERVE...5 OUR RELATIONSHIP WITH PHYSICIANS AND OTHER HEALTH CARE PROVIDERS...

Standard Operating Procedures (SOP) Research and Development Office

VHA Privacy Policy Training FY VHA Privacy Office

Privacy and Security Compliance: The. Date Presenter Name of Member Organization

FACULTY OF DENTISTRY, THE UNIVERSITY OF HONG KONG THE PRINCE PHILIP DENTAL HOSPITAL

HIPAA PRIVACY TRAINING

PRIVACY POLICY USES AND DISCLOSURES FOR TREATMENT, PAYMENT, AND HEALTH CARE OPERATIONS

What to do When Faced With a Privacy Breach: Guidelines for the Health Sector. ANN CAVOUKIAN, Ph.D. COMMISSIONER

Emergency Medical Services Division Policies Procedures Protocols

INVESTIGATION REPORT

A PHIPA Update from the IPC

FCSRMC 2017 HIPAA PRESENTATION

POLICY STATEMENT PRIVACY POLICY

DATA PROTECTION POLICY (in force since 21 May 2018)

I. PURPOSE DEFINITIONS. Page 1 of 5

Protecting PHI for Clinical Staff and Students

PRIVACY AND ANTI-SPAM CODE FOR OUR DENTAL OFFICE Please refer to Appendix A for a glossary of defined terms.

Report of the Information & Privacy Commissioner/Ontario. Review of the Cardiac Care Network of Ontario (CCN):

Health Insurance Portability and Accountability Act (HIPAA)

UCLA HEALTH SYSTEM CODE OF CONDUCT

Piedmont Healthcare, Inc. Code of Conduct

It defines basic terms and lists basic principles that all LSUHSC-NO faculty, staff, residents and students must understand and follow.

Health Insurance Portability and Accountability Act. Awareness Training for Volunteers

Security Risk Analysis

What is HIPAA? Purpose. Health Insurance Portability and Accountability Act of 1996

Overview. COTBC Practice Standards for Managing Client Information, Tel: (250) Toll-Free BC: 1 (866) Fax: (250)

PRIVACY IMPACT ASSESSMENT (PIA) For the

PATIENT BILL OF RIGHTS & NOTICE OF PRIVACY PRACTICES

Record Keeping - Legal and Ethical Core CPD

INFORMATION ABOUT CHILDREN S MERCY HOSPITALS AND CLINICS

Understanding the Privacy and Security Regulations

Notice of HIPAA Privacy Practices Updates

HIPAA for CNAs. This course has been awarded one (1.0) contact hour. This course expires on May 31, 2020.

The University of Toledo. Corporate Compliance and HIPAA Training. Presented by: The Compliance and Privacy Office

Resident/Fellow Training Orientation Policies

INFORMATION TECHNOLOGY, MOBILES DIGITAL MEDIA POLICY AND PROCEDURES

NOTICE OF PRIVACY PRACTICES

Compliance Program And Code of Conduct. United Regional Health Care System

Code of Ethical Conduct The Right Thing to Do and How to Do it Right!

PATIENT RIGHTS TO ACCESS PERSONAL MEDICAL RECORDS California Health & Safety Code Section

STANDARDS OF CONDUCT SCH

Williamson County EMS (WCEMS) HIPAA Training for Third Out Riders

The Queen s Medical Center HIPAA Training Packet for Researchers

This notice describes Florida Hospital DeLand s practices and that of: All departments and units of Florida Hospital DeLand.

North Hawaii Community Hospital Volunteer Services Application

HH Health System-Shoals, LLC dba Helen Keller Hospital Notice of Privacy Practices

Contribute to society, and. Act as stewards of their professions. As a pharmacist or as a pharmacy technician, I must:

The Family Crisis Center of East Texas, Inc. (Women s Shelter of East Texas)

LifeBridge Health HIPAA Policy 4. Uses of Protected Health Information for Research

HIPAA Privacy Rule. Best PHI Privacy Practices

ENTERPRISE INCOME VERIFICATION (EIV) SECURITY POLICY

Transcription:

The Personal Health Information Act (PHIA) Updated: November 2017

The University of Manitoba is committed to the principles of access to information and the protection of privacy as they are outlined within the Province s access and privacy legislation The Freedom of Information and Protection of Privacy Act (FIPPA) and The Personal Health Information Act (PHIA). These Acts provide the public with the right of access to records in the custody or under the control of the University of Manitoba, while safeguarding the privacy of individuals.

The is a part of the Office of Fair Practices and Legal Affairs, and is located on the second floor of the Elizabeth Dafoe Library, Fort Garry Campus: 233 Elizabeth Dafoe Library University of Manitoba Winnipeg, MB, R3T 2N2 Fax: (204) 474-9308 Email: fippa@umanitoba.ca

The Office consists of the following staff members: Karen Meelker, r Rachelle Ross, Records Manager/Archivist Robyn Wellman, Access and Privacy Coordinator Mary Grace Golfo-Barcelona, Office Assistant Jeanette Mockford, NCTR Access and Privacy Coordinator

PHIA Training This training slide show is made available to health care and nonhealth care employees, associates, appointees, agents (through contract or agreement), students, and researchers of the University of Manitoba. This content references PHIA directly, representing the perspectives of a higher education institution. This slide show takes about 1 hour to complete. Please give yourself enough time to familiarize yourself with the material.

PHIA Training This training is intended to provide participants with sufficient knowledge of The Personal Health Information Act in order to sign the University of Manitoba Personal Health Information Pledge of Confidentiality. Researchers, research assistants, lab technicians, and all employees, appointees, associates, and contractors who access or may be exposed to personal health information in connection with research are required to complete an institutional PHIA Training Program.

PHIA Training The PHIA Training Program consists of: a) Reviewing the Access and Privacy Policy and Procedures The University has Access and Privacy Policies and Procedures that provide specific rules about access to and protection of Personal Health Information held by the institution. b) Reviewing this PHIA training presentation Refer to the overview on the next slide. c) Signing the Pledge of Confidentiality

PHIA Training Overview The Personal Health Information Act (PHIA) Key Definitions Protection of Privacy and Confidentiality Access, Collection, Use, Disclosure, Security Safeguards, Storage and Disposal of Personal Health Information PHIA and Research Breaches of Confidentiality PHIA Quiz UM s PHIA Pledge of Confidentiality

Personal Health Information Act The Personal Health Information Act (PHIA) provides the legislation framework for managing the information practices of Personal Health Information (PHI) in Manitoba. PHIA applies to Manitoba government departments, agencies and public bodies, including educational bodies, and health information Trustees (health care professionals, facilities, and agencies).

Personal Health Information Act The purposes of PHIA are: to provide the right to examine or receive a copy of PHI to provide the right to request corrections to your own PHI to establish rules for collection, use and disclosure of PHI to control the collection, use and disclosure of the Personal Health Identification Number (PHIN) to provide for an independent review of the actions of a trustee under the Act

Key Definitions What is Personal Information? What is Personal Health Information? What is a Record? What is a Trustee? What is Privacy? What is Confidentiality?

Key Definitions What is Personal Information? istock.com/dragonimages

Personal Information is Recorded information about an identifiable individual including: name, home contact information age, sex, sexual orientation, marital or family status ancestry, race, colour, nationality, national or ethnic origin religion, creed, religious belief, association or activity person health information blood type, fingerprints, hereditary characteristics political belief, association or activity education, employment or occupation, history of these three source of income, financial circumstances, activities or history criminal history including regulatory offences

Personal Information is Continued own personal views, except if about another person views or opinions about the individual expressed by another person identifying number, symbol or other particular assigned to the individual (i.e. student number or employee number) It is important to note that the views or opinions that you have regarding another individual belongs to that individual. When a view or opinion about an individual is recorded, that information becomes that individual s Personal Information.

Key Definitions What is Personal Health Information? istock.com/twinsterphoto

Personal Health Information is Recorded information about an identifiable individual that relates to: the individual s health, or health care history, including genetic information about the individual; the provision of health care to the individual, including a doctor s note; payment for health care provided to the individual, and includes bills, receipts, etc.;

Personal Health Information is Recorded information about an identifiable individual that relates to: the PHIN and any identifying number, symbol or particular assigned to an individual; and any identifying information about an individual that is collected in the course of, and is incidental to, the provision of health care or payment for health care.

Personal Health Information is Personal Health Information may also include: Behaviour resulting from illness or treatment Financial position Home conditions Domestic difficulties Other private matters

Personal Health Information is Personal Health Information does not include: Anonymous or statistical information that does not permit individuals to be identified. However, if two or more seemingly anonymous or statistical data items can be combined to readily identify an individual, the data may be considered Personal Health Information.

Key Definitions What is a Record? Photo supplied by istock

What is a Record? A Record or Recorded Information Means a record of information In any form: written, photographed, recorded or stored in any manner, on any storage medium; or By any means: electronic, graphic, or mechanical means. Examples include X-ray, voicemail, fax or email.

What is a Record? Examples of Records Files Emails Databases Documents Photographs Rough notes and drafts Annotations and sticky notes

Key Definitions What is a Trustee? istock.com/chris2766

What is a Trustee? A Trustee means any of the following: health professional, health care facility, public body, health services agency that collects or maintains Personal Health Information.

What is a Trustee? Health Professionals: Doctor, Dentist, Pharmacist, Nurse, Chiropractor, Therapist, Social Worker, Midwife Health Care Facilities: Hospital, Personal Care Home, Medical Clinic, Laboratory, Psychiatric Facility

What is a Trustee? Public Bodies: University of Manitoba, School Divisions, City of Winnipeg The University is a Public Body, and is therefore a Trustee. However, it is not a Health Facility. Health Services Agencies: J.A. Hildes Northern Medical Unit, Centre for Community Oral Health, V.O.N.

What is a Trustee? Certain health care units that operate within the University, which hold Personal Health Information, are also Trustees: Dental Clinics Bannatyne Campus University Health Services University Pharmacy Athletic Therapy Centre The University also holds student and employee Personal Health Information, e.g., medical notes.

What is a Trustee? A Trustee has a duty to: Help individuals gain access to their own PHI; and Protect the privacy of individuals in the collection, use, disclosure, security, retention and destruction of PHI.

Health Professionals as Trustees A health professional with a private practice conducts the administrative side of their business under the federal act, The Personal Information and Protection of Electronic Documents Act, PIPEDA. However, the health care side of the business falls under PHIA, with the health professional as the Trustee. Where a health professional works for the provincial government, a health care facility, a public body, or an agency, that other entity (provincial government, health care facility, public board or agency) is the Trustee. In Manitoba, the Trustee operates under the provincial act, PHIA.

Health Professionals as Trustees Some health professionals have dual or multiple roles (i.e. A private practice that operates within a public body). Records created and received in each role should be managed separately. If there is overlap in the records they need to be coordinated to meet the highest requirements of all the legislation.

Key Definitions What is Privacy? istock.com/alexlmx

What is Privacy? Privacy means an individual s right to be free from intrusion or interference from others. An important aspect of privacy is the individual s right to control access to their Personal Information and Personal Health Information.

Key Definitions What is Confidentiality? istock.com/ziquiu

What is Confidentiality? The obligation of a Trustee to protect the Personal Information and Personal Health Information entrusted to it, to maintain the secrecy of the information and not misuse or wrongfully disclose it.

What is Confidentiality? All persons associated with the University of Manitoba are responsible to protect all Personal Information and Personal Health Information. Accessing, using and disclosing information is acceptable only when required to do your job. Discussions about identifiable individuals should not take place in public places or in the presence of people who do not need to know the information.

What is Confidentiality? Individuals have an expectation that the University of Manitoba will protect the privacy, confidentiality and security of the Personal Information and Personal Health Information in it s custody. As a person associated with the University of Manitoba, it is your responsibility to hold all Personal Information and Personal Health Information in the highest of confidence.

Privacy and Confidentiality General responsibilities of Trustees: Limit on amount of PHI used or disclosed Limit access to employees who NEED TO KNOW to carry out their responsibilities Apply restrictions on the use of PHI Apply restrictions on the disclosure of PHI Ensure the accuracy of PHI Implement and adhere to security safeguards on PHI Protect individuals privacy

Privacy and Confidentiality Access only the minimum amount of information that you need to know in order to do your job. This is the minimum amount, need to know rule. Snooping means to look for information about yourself or someone else in an attempt to find out details about them you do not need in order to do your job. If you are found snooping, you may face disciplinary action and a report to your professional regulatory body (if applicable).

Privacy and Confidentiality Privacy and confidentiality must be protected during: Collection taking information from a patient, client, research participant or other; having an individual give information on a form Access retrieving the information Use sharing the information within the Trustee Disclosure releasing the information beyond the Trustee Storage holding the information after its day-to-day use is ended Destruction destroying the information after the need for retention is ended

Privacy and Confidentiality Privacy and confidentiality must be protected regardless of how information is accessed, whether it is: heard; viewed; learned; handled; or otherwise, obtained.

Quick Review Personal Information (PI) is recorded personal information about identifiable individuals. Personal Health Information (PHI) is recorded health information about identifiable individuals. A record may come in many forms (electronic, paper, text, image). Trustees are public bodies entrusted to collect, use, disclose, store and dispose of PI and PHI. Trustees are required to help people gain access to their own PI and PHI, and to protect the information under it s control.

Quick Review An important aspect of privacy is the individual s right to control access to their PI and PHI. Trustees are obliged to maintain the confidentiality, or secrecy, of the PI and PHI entrusted to them. The minimum amount, need to know rule. The privacy and confidentiality of the information in the custody of a Trustee must be maintained throughout it s entire lifespan, from collection to destruction. Privacy and confidentiality must be protected regardless if it is heard, viewed, learned, handled or otherwise obtained.

Access to PHI

Access to PHI - Individuals Individuals have a right to: Review their Personal Health Information Request corrections be made where necessary Receive a copy of their Personal Health Information upon written request Requests for access to, and correction of, PHI should first be made to the UM office where the information is held.

Access to PHI - Individuals A request for access must be responded to as promptly as possible, but no later than: 24 hours if the individual is a hospital in-patient and the information is about care currently being provided; 72 hours to a person who is not a hospital in-patient and the information is about care currently being provided; 30 days in any other case.

Access to PHI - Trustees In order to maintain the privacy and confidentiality of the PHI in the custody and under the control of the University of Manitoba, access to PHI by UM employees must be limited to: those who need to know in order to carry out their responsibilities the least amount of information necessary to carrying out the responsibility. These limitations apply to records in any form. This follows the minimum amount, need to know rule.

Collection of PHI istock.com/dolgachov

Collection of PHI Individuals are to be notified about the purpose for which their Personal Health Information is being collected. Whenever possible, Personal Health Information should be collected directly from the individual the Personal Health Information is concerning. Personal Health Information should be used only for the purpose for which it was originally collected.

Collection of PHI Trustees may only collect as much Personal Health Information as is reasonably necessary to accomplish the purpose for which it is collected. This follows the minimum amount, need to know rule.

Collection of PHI Notice of Collection Practices A Trustee who collects Personal Health Information directly from the individual the information is about must take reasonable steps to inform the individual: a) Of the purpose for which the information is being collected; and b) How to contact an employee of the Trustee who can answer the individual s questions about collection.

Collection of PHI Here s an example of a UM Notification Statement, which is typically placed at the bottom of the form in which the information is being collected. Note the sections in blue, which makes the form it is placed on compliant with the notice of collection practices outlined in PHIA: Notice Regarding Collection, Use, and Disclosure of Personal Health Information by the University Your personal health information is being collected under the authority of The University of Manitoba Act. The information you provide will be used by the University to provide health care services at University Health Services. Your personal health information will not be used or disclosed for other purposes, unless permitted by The Personal Health Information Act (PHIA). If you have any questions about the collection of your personal health information, contact the Access & Privacy Office (tel. 204-474-9462), 233 Elizabeth Dafoe Library, University of Manitoba, Winnipeg, MB, R3T 2N2.

Use and Disclosure of PHI istock.com/xixinxing

Use and Disclosure of PHI USE means revealing PHI to someone within the Trustee s organization. Example: Sending a requisition that contains a patient s name and PHIN to the X-ray technician within the hospital in order to take X-rays of a patient. DISCLOSURE means revealing PHI to someone outside the Trustee s organization. Example: Disclosing a patient s name, contact information and PHIN to a specialist outside of the hospital in which you work.

Use and Disclosure of PHI You cannot use or disclose Personal Health Information: In the presence of those that are NOT entitled to the information; or In public places, such as elevators, lobbies, cafeterias, off premises, etc. Be aware of surroundings. Personal Health Information is best discussed in a closed setting.

Use and Disclosure of PHI You may use or disclose Personal Health Information ONLY if you: need to know this information to do your job; have consent from the individual the PHI is about; are a person permitted to exercise the rights of another individual (e.g., you are the child of an elderly person); or are authorized by PHIA, ss. 21, 22, or by other legislation Always remember to apply the minimum amount, need to know rule.

Use and Disclosure of PHI When is consent required? If the proposed use or disclosure of Personal Health Information is not outlined in Sections 21, 22 and 23 of PHIA, consent is required. When consent is required, it must: a) Relate to the purpose for which the information is used or disclosed; b) Be knowledgeable; c) Be voluntary; and d) Not be obtained through misrepresentation.

Use and Disclosure of PHI Knowledgeable Consent Consent is knowledgeable if the individual who gives it has been provided with the information that a reasonable person in the same circumstances would need in order to make a decision about the use or disclosure of the information. Consent With Conditions An individual may give consent subject to conditions, such as limiting which information can be used or disclosed, or setting a time frame in which the consent applies.

Use and Disclosure of PHI Express or Implied Consent Consent can be express or implied. Express Consent is clearly and unmistakably stated. Implied Consent is judged by conduct, rather than stated. When Express Consent is Required Consent must be express and not implied if: The disclosure is to someone who is not a Trustee; or The consent is to a Trustee, but not for the original purpose of providing health care.

Use and Disclosure of PHI Consent May Be Withdrawn An individual who has given consent, whether express or implied, to the use or disclosure of Personal Health Information may withdraw their consent by notifying the Trustee. A withdrawal does not have retroactive effect. Verbal Consent Express Consent need not be in writing. However, it is good practice to make a record of a consent that has been given verbally.

Use and Disclosure of PHI Disclosing PHI with Family and Friends If an individual is a patient or resident in a health care facility, the Trustee may provide information to family/friends about health care currently being provided: If this is in keeping with good medical and professional practice, and If the Trustee believes the individual would not object. Remember, limit the disclosure to the minimum amount about the care currently being provided.

Use and Disclosure of PHI Disclosing General Information Trustees may provide general health information to any person, unless the patient/client specifies otherwise. This information is limited to: The individual s name General health status Location within the facility, unless this would reveal specific information about the health of that person

Quick Review A person has a right to request a copy of his/her PHI from the holding trustee. Individuals need to be notified about how their PHI will be used and disclosed. Access to PHI should be limited to those who need to know to do their jobs. The use or disclosure of PHI is limited to only those who need to know the information to do their job.

Quick Review Consent is required to use or disclose PHI unless authorized under Sections 21, 22 and 23 of PHIA. Consent may be express or implicit, verbal or written, and may contain conditions. Disclosing PHI to family and friends is permitted. It must be limited to care currently being provided, in keeping with good practice, and if the individual would not object. General information can be disclosed unless the individual objects.

Security and Storage of PHI istock.com/oliver_le_moal

Security and Storage of PHI Personal Health Information is to be properly secured and maintained to protect privacy and confidentiality. Personal Health Information is to be protected from accidental destruction or deterioration or loss by heat, cold, moisture, theft, or vandalism.

Security and Storage of PHI PHIA Requires Trustees to: Adopt reasonable safeguards: administrative, technical, physical and electronic; Protect the security, confidentiality, accuracy, and integrity of the Personal Health Information; and Apply reasonable security throughout the lifetime of a record containing Personal Health Information.

Security and Storage of PHI Protecting the integrity of PHI means the preservation of its content. This would provide confidence that the information has not been tampered with or modified other than as authorized. Preservation of content is maintained by protecting and securing the PHI throughout collection, access/retrieval, use, disclosure/transfer, and storage.

Security and Storage of PHI A Trustee is obligated to protect Personal Health Information by adopting reasonable administrative, technical, physical and electronic safeguards, that ensure the confidentiality, security, accuracy and integrity of the information. In determining the reasonableness of the safeguards to be adopted, a Trustee should take into account the degree of sensitivity of the Personal Health Information to be protected.

Security and Storage of PHI Administrative Safeguards: Policies and Procedures; Guidelines and Resources PHIA training and signing of the Pledge of Confidentiality Proper management of swipe cards or key access Secure print codes at printers/fax machines

Security and Storage of PHI Technical Safeguards: Role-based profiles on new or existing information management systems Base profiles on the individual s role, which determines the level of access required Multiple levels of authentication for high degree of sensitive information

Security and Storage of PHI Physical Safeguards: Arrange office furniture to limit the ability of others to access your files Locks on doors and filing cabinets Clean off your desk at the end of the day (implement a Clean Desk Policy as an Administrative Safeguard)

Security and Storage of PHI Electronic Safeguards: Encryption of files for transmission or transport Passwords on all devices Up-to-date anti-virus software Firewalls

Security and Storage of PHI Additional Safeguards for Electronic Information: All Trustees must create and maintain a record of user activity for any electronic information system that is used to maintain PHI. This applies to all PHI, including research information, unless: the information is demographic, it is used or disclosed for statistical purposes, or it is disclosed under PHIA 22(2)(h) as part of an approved transfer to a health information network.

Security and Storage of PHI Laptops and Removable Storage Personal Health Information should not be carried on electronic portable devices unless it is for an authorized purpose. If the movement of Personal Health Information from the premises of the Trustee is absolutely necessary, and authorized, appropriate safeguards, such as encryption and passwords, must be put in place to ensure that the information is protected. Refer to the University s Travelling with Records Guidelines.

Security and Storage of PHI Confidentiality Maintaining the confidentiality of the information in your custody or control is another way to safeguard Personal Health Information. In your life you play several roles, such as family member, friend, relative, student, researcher, or employee. As a person associated with the University of Manitoba, you may learn confidential information about people you know. You cannot share the information you learn at the UM with people not entitled to know the information in other parts of your life.

Disposal of PHI istock.com/uwe_merkel

Disposal of PHI A Trustee must ensure that Personal Health Information is destroyed by methods that protect the privacy of the individual the information is about. Records in all University departments should be destroyed according to a destruction schedule using a Requisition to Destroy Records (RDR) form. This form serves as a destruction log for all records that contain Personal Health Information.

Disposal of PHI Once the RDR has been approved, confidential records may be destroyed using a secure method. The best and most secure way for destroying confidential records is shredding. The records can either be shredded using the University s preferred supplier, or using an in-office shredder. Both of these options comply with the standards for the secure destruction of confidential records.

Disposal of PHI The University of Manitoba s preferred shredding supplier is Shred-It, which provides bulk pick-up service for large quantities of materials, or a secure console that is serviced as required. Certificates of Destruction are provided by Shred-It for both services. Refer to our Document Disposal website for more information.

Disposal of PHI Small amounts can be destroyed using an in-office shredder. When the in-office shredder is full, seal the shredded material in a clear plastic bag and deposit the bag in one of the large blue recycling bins placed in or near your department. The bins are collected by Physical Plant and the shredding is sent off-site to be recycled.

Disposal of PHI Electronically held personal health information should be destroyed by deleting the files off the network drive. Personal Health Information should not be stored on the computer s hard drive. IST will assist any office requiring destruction of electronic records, or with the confidential destruction of hard drives, including the hard drives from multi-purpose printer/fax/scanner units.

Quick Review It is everyone s responsibility to ensure reasonable safeguards are in place to protect PHI. Laptops are particularly vulnerable to burglary and theft. Personal Health Information contained on a laptop must be encrypted and the laptop must be password protected. Part of protecting PHI is making sure that records are not accessed, altered or destroyed without authorization. Remember the four main types of safeguards: Administrative, Technical, Physical, and Electronic.

Quick Review Records in all University departments should be destroyed according to a destruction schedule. Before destruction occurs, a Requisition to Destroy Records (RDR) should be submitted and approved. Shredding is the best and most secure method of destruction. For help with the destruction of electronic records and hard drives, contact IST.

Research at the University istock.com/bee32

Research at the University Research involving humans requires Research Ethics Board (REB) approval, including: Research that involves clinical trials and other biomedical interventions; and Research that uses Personal Health Information (PHI). If the Personal Health Information is maintained by the government or a government agency, review and approval must come from the Health Information Privacy Committee (HIPC).

Research at the University If the research is conducted in connection with the University of Manitoba, review and approval must come from one of the five Research Ethics Boards: Psychology/Sociology REB Education/Nursing REB Joint-Faculty REB Biomedical Research Ethics Board (BREB) Health Research Ethics Board (HREB)

Research at the University At the Bannatyne Campus, most research is reviewed and approved by the BREB or the HREB. The BREB reviews all research ethics protocols involving clinical trials and other biomedical research interventions. The HREB reviews research involving the behavioral sciences, surveys, examinations of medical records and protocols of generally lesser risk.

Research at the University At the Fort Garry Campus, three boards review and approve research: Education/Nursing REB: Faculties of Education, Kinesiology and Recreation Management, Extended Education, Engineering, and the College of Nursing Psychology/Sociology REB: Faculty of Social Work, Departments of Sociology, Psychology, and Counseling Services Joint-Faculty REB: Remaining Faculties and Departments

Research at the University Researchers using information/data held by Manitoba Centre for Health Policy (MCHP) must fulfill several reviews and approvals: HIPC Health Information Privacy Committee; HREB approval from the UM. An HREB from another institution will be considered if it is accompanied by a letter indicating that the review is accepted by that institution; MCHP internal review. Depending on the data source other approvals may be required. A full explanation is found at U of M website: Manitoba Centre for Health Policy (MCHP) Applying for Access

Research at the University Disclosures of PHI for Health Research A Trustee may disclose Personal Health Information to a person conducting health research if the requirements outlined in Section 24 of PHIA are met. Outlines who can approve disclosure of PHI for health research; Establishes conditions for approval; Details required agreements for disclosure of PHI; and Sets limits on disclosure of PHI for health research. See The Personal Health Information Act, Section 24 for details.

Research at the University Researchers collect, access, use, and share information about research participants during the course of research. Tri-Council Policy Statement defines five classes of information to be aware of: a) Identifying b) Identifiable c) De-identified/coded d) Anonymized e) Anonymous

Research at the University a) Identifying information: The information identifies an individual through direct identifiers (e.g., name, address, social insurance number, or personal health identification number). b) Identifiable information: The information could be used to reidentify an individual through a combination of indirect identifiers (e.g., date of birth, place of residence, or unique personal characteristic) using reasonably foreseeable means.

Research at the University c) De-identified/coded information: Identifiers are removed and replaced with a code. Depending on access to the code, it may be possible to re-identify specific individuals (e.g., individuals are assigned a code name and the principal investigator retains a list that links the code name with the individual s actual name so data can be re-linked if necessary). Researchers who have access to the code and the data have identifiable information.

Research at the University d) Anonymized information: Information is irrevocably stripped of identifiers, and a code is not kept to allow future re-linkage. e) Anonymous information: Information never had identifiers associated with it (e.g., anonymous surveys).

Research at the University Retention of Research Records Researchers must outline policies and procedures to destroy or remove identifying information as soon as possible. Researchers must identify intended retention periods in the REB submission for all data. Researchers may be asked to justify the rationale for a certain period of retention in the application.

Quick Review All research involving humans requires REB or HIPC approval. Disclosure of Personal Health Information for health research is governed by Section 24 of PHIA. Different classes of Personal Health Information (identifiable, deidentified, anonymized, anonymous) require different levels of security protection.

Breach of Privacy istock.com/xixinxing

Breach of Privacy A Breach of Privacy occurs when Personal Information, including Personal Health Information, is collected, accessed, used, disclosed, transported, transmitted, transferred or destroyed other than as authorized, or when the accuracy, confidentiality or integrity of the information is compromised. Examples may include, but are not limited to, the viewing of confidential information by unauthorized individuals, the access, theft or loss of University Records and the unauthorized destruction of such information.

Breach of Privacy Snooping is an example of a breach of privacy. Under The Personal Health Information Act, snooping is a fineable offence. Any individual who willfully uses, discloses, gains access to or attempts to gain access to another person s Personal Health Information is guilty of an offence, and can be fined. Some recent examples of snooping into Personal Health Information

Breach of Privacy

Breach of Privacy A Breach of Privacy occurs when: PHI is accessed by someone not entitled to that information, including snooping. PHI is shared (used or disclosed) with those not entitled to that information. PHI is removed from the custody of the trustee without authorization. The integrity of a record is compromised. Collect more PHI than is required to do the job. Do not appropriately safeguard PHI.

Breach of Privacy If you know or suspect a Breach of Privacy has occurred, immediately notify: The head of your UM office, UM health unit, or health care agency. The head will notify the dean or director, the Vice-President (Administration), and the.

Breach of Privacy The, in consultation with others, will decide whether an investigation is necessary; If the decision is yes, the will: inquire into the incident/allegation consult with appropriate persons to determine whether a breach has occurred document findings recommend disciplinary action, if applicable

PHIA Quiz istock.com/cacaroot

PHIA Quiz True or False? In order to maintain the privacy and confidentiality of the Personal Health Information held in electronic systems, access to the electronic systems by UM employees must be limited to only those who need access in order to do their jobs. However, once they have access to the electronic system, they are permitted to view all records and information within that system. True False

PHIA Quiz True or False? In order to maintain the privacy and confidentiality of the Personal Health Information held in electronic systems, access to the electronic systems by UM employees must be limited to only those who need access in order to do their jobs. However, once they have access to the electronic system, they are permitted to view all records and information within that system. True False You are only permitted to view the records and information within the system that you require for your job. Remember the minimum amount, need to know rule.

PHIA Quiz True or False? A Trustee who collects Personal Health Information directly from the individual the information is about must take reasonable steps to inform the individual of the purpose in which the information is being collected, and how to contact an employee of the Trustee who can answer the individual s questions about collection. True False

PHIA Quiz True or False? A Trustee who collects Personal Health Information directly from the individual the information is about must take reasonable steps to inform the individual of the purpose in which the information is being collected, and how to contact an employee of the Trustee who can answer the individual s questions about collection. True False

PHIA Quiz Which of the following statements are true about consent? An individual may give consent subject to conditions, such as limiting which information can be used or disclosed, or setting a time frame in which the consent applies. An individual who has given consent to the use or disclosure of personal health information may withdraw their consent by notifying the trustee. A withdrawal of consent does not have to be retroactive. Express consent does not need to be in writing. All of the above.

PHIA Quiz Which of the following statements are true about consent? An individual may give consent subject to conditions, such as limiting which information can be used or disclosed, or setting a time frame in which the consent applies. An individual who has given consent to the use or disclosure of personal health information may withdraw their consent by notifying the trustee. A withdrawal of consent does not have to be retroactive. Express consent does not need to be in writing. All of the above.

PHIA Quiz A co-worker needs some information quickly and tells you they can t remember their password to get into a clinical database. The coworker asks if you could do them a favor and just log into the system and they will take over and get the information they need. What should you do? Give the co-worker your password. She is in a hurry and needs the information quickly to do her job. What s the big deal?! Log into the database and let the co-worker access the information she needs. Don t share your password

PHIA Quiz A co-worker needs some information quickly and tells you they can t remember their password to get into a clinical database. The coworker asks if you could do them a favor and just log into the system and they will take over and get the information they need. What should you do? Give the co-worker your password. She is in a hurry and needs the information quickly to do her job. What s the big deal?! Log into the database and let the co-worker access the information she needs. Don t share your password. Passwords are a safeguard that only work if they are kept confidential.

PHIA Quiz What type of disciplinary action may be taken if it is confirmed that you used or disclosed Personal Health Information in violation of PHIA? A verbal or written warning Suspension Termination of employment, contract, association or appointment with the University of Manitoba A report to the appropriate professional regulatory body Any of the above

PHIA Quiz What type of disciplinary action may be taken if it is confirmed that you used or disclosed Personal Health Information in violation of PHIA? A verbal or written warning Suspension Termination of employment, contract, association or appointment with the University of Manitoba A report to the appropriate professional regulatory body Any of the above

PHIA Quiz You are involved in the care of a high profile person. Your involvement in this person s care has been documented by media reports, so it has become public knowledge. Your friends and family keep asking questions about the person. Your involvement is already public knowledge, so you tell them what you know so far. Is this a breach of privacy? Yes No

PHIA Quiz You are involved in the care of a high profile person. Your involvement in this person s care has been documented by media reports, so it has become public knowledge. Your friends and family keep asking questions about the person. Your involvement is already public knowledge, so you tell them what you know so far. Is this a breach of privacy? Yes Disclosing information about an individual with those who have no business or health-care related purpose for knowing the information is a breach of privacy. No

PHIA Quiz You are training a new employee on the electronic health record system your clinic uses and want to show the new employee an example of what a completed record looks like. You are also a patient at the clinic, so you use your record as a training tool. Is this a breach? Yes No

PHIA Quiz You are training a new employee on the electronic health record system your clinic uses and want to show the new employee an example of what a completed record looks like. You are also a patient at the clinic, so you use your record as a training tool. Is this a breach? Yes Even though it is your record, your role as a patient is different from your role as an employee. You should only access records you require for your job. No

PHIA Quiz You are organizing a curling team to compete with other teams in your community. You want a ringer. You recall a former student who mentioned she was quite good at the sport but had not played for some time and was eager to start again. You access her student record to get her telephone number. You make sure to ignore all other information. Is this a breach of privacy? No, because telephone numbers are public information. You simply accessed it in a different way. Yes, because the phone number was collected for educational purposes.

PHIA Quiz You are organizing a curling team to compete with other teams in your community. You want a ringer. You recall a former student who mentioned she was quite good at the sport but had not played for some time and was eager to start again. You access her student record to get her telephone number. You make sure to ignore all other information. Is this a breach of privacy? No, because telephone numbers are public information. You simply accessed it in a different way. Yes, because the phone number was collected for educational purposes. Using the information for a use that is not consistent with the original purpose it was collected for is a breach.

PHIA Quiz You notice student counselling records sticking out of a garbage can, which includes the students names, student numbers, PHINs and contact information. Is discarding these papers in this manner a violation of PHIA? Yes No

PHIA Quiz You notice student counselling records sticking out of a garbage can, which includes the students names, student numbers, PHINs and contact information. Is discarding these papers in this manner a violation of PHIA? Yes. Confidential records must be destroyed appropriately (shredding). No

PHIA Quiz You are leaving work after a long day. Just as you get to the parking lot you notice a USB drive lying on the ground. What should you do? Do nothing and leave it there. Pick it up and take it home for your own personal use. Take it to the. Take it to the nearest lost and found.

PHIA Quiz You are leaving work after a long day. Just as you get to the parking lot you notice a USB drive lying on the ground. What should you do? Do nothing and leave it there. Pick it up and take it home for your own personal use. Take it to the. Take it to the nearest lost and found.

PHIA Quiz You meet an individual through your involvement in a research project. You feel that there is a connection and would like to contact them about meeting up for coffee. You were too shy to ask them in person, so you look up their contact information in the electronic system you are using for research and copy down their email address. When you are at home, you send them an email using your Yahoo account (not your work account) to see if they are interested in meeting. Is this a violation of that individual s privacy? Yes No

PHIA Quiz You meet an individual through your involvement in a research project. You feel that there is a connection and would like to contact them about meeting up for coffee. You were too shy to ask them in person, so you look up their contact information in the electronic system you are using for research and copy down their email address. When you are at home, you send them an email using your Yahoo account (not your work account) to see if they are interested in meeting. Is this a violation of that individual s privacy? Yes You have access to that information only for the purpose in which it was collected, for research, not for any other use. No

PHIA Pledge of Confidentiality

PHIA Pledge of Confidentiality At the University, a Personal Health Information Pledge of Confidentiality ( Confidentiality Pledge ) is required of individuals as a condition of their employment, appointment, contract, or association with designated faculties, programs and offices, and as a condition of research involving humans. The requirement extends to student employees and researchers.

PHIA Pledge of Confidentiality 1. All University employees and persons associated with the University are responsible for protecting the security and confidentiality of all Personal Health Information (verbal or recorded in any form) that is obtained, handled, viewed, heard, or learned, in the course of their work or association with the University. 2. Personal Health Information shall be protected during its collection, access, use, retention, storage and destruction.

PHIA Pledge of Confidentiality 3. You may only use or disclose Personal Health Information in the discharge of your responsibilities and duties (including reporting duties imposed by legislation) on a need to know basis. 4. Discussion regarding Personal Health Information shall not take place in the presence of persons not entitled to such information, or in public places (elevators, lobbies, cafeterias, off premises, etc.).

PHIA Pledge of Confidentiality 5. Unauthorized use or disclosure of confidential information shall result in a disciplinary response up to and including termination of employment, contract, association, or appointment with the University of Manitoba. 6. A confirmed breach of confidentiality may result in disciplinary action and be reported to the individual s professional body. 7. All individuals who become aware of a possible breach of the security or confidentiality of Personal Health Information shall follow the procedures outlined under Breach of Privacy.

PHIA Pledge of Confidentiality To obtain your University of Manitoba Personal Health Information Pledge of Confidentiality declaration form, click here. Submit your completed form by saving your completed form to your computer and send it as an attachment to fippa@umanitoba.ca

PHIA Pledge of Confidentiality Please note, it is best to view and complete the declaration form using Adobe Acrobat products. Click here to access free downloads of Adobe Reader for a variety of computer systems. If you have any questions about the declaration form, please contact our office at fippa@umanitoba.ca or 204-474-7559.

Thank you! If you have questions about the training presentation, please contact the at: Phone: 204.474.7559 E-mail: fippa@umanitoba.ca All images are used with permission from Microsoft unless otherwise noted.