MCCP Online Orientation

Similar documents
HIPAA Training

What is HIPAA? Purpose. Health Insurance Portability and Accountability Act of 1996

Privacy and Security Compliance: The. Date Presenter Name of Member Organization

CLINICIAN S GUIDE TO HIPAA PRIVACY

HIPAA PRIVACY TRAINING

Advanced HIPAA Communications and University Relations

HIPAA and HITECH: Privacy and Security of Protected Health Information

Student Orientation: HIPAA Health Insurance Portability & Accountability Act

HIPAA. Health Insurance Portability and Accountability Act. Presented by the UMMC Office of Integrity and Compliance

HIPAA THE PRIVACY RULE

The Privacy & Security of Protected Health Information

Health Insurance Portability and Accountability Act. Awareness Training for Volunteers

HIPAA Health Insurance Portability and Accountability Act of 1996

A general review of HIPAA standards and privacy practices 2016

HIPAA Privacy Rule. Best PHI Privacy Practices

Privacy and Security For Teammates

Updated FY15 Dignity Health General Compliance Education for Staff Module 2

Study Management PP STANDARD OPERATING PROCEDURE FOR Safeguarding Protected Health Information

WHAT IS HIPAA? HIPAA is the ELECTRONIC transmission of Three programs have been enacted to date Privacy Rule April 2004

Health Insurance Portability and Accountability Act (HIPAA)

Compliance Program, Code of Conduct, and HIPAA

WRAPPING YOUR HEAD AROUND HIPAA PRIVACY REQUIREMENTS

Information Privacy and Security

Privacy and Security Orientation for Visiting Observers. DUHS Compliance Office

VHA Privacy Policy Training FY VHA Privacy Office

Health Information Privacy Policies and Procedures

HIPAA for CNAs. This course has been awarded one (1.0) contact hour. This course expires on May 31, 2020.

Valley Regional Medical Center HIPAA AND HITECH EDUCATION

Breach Reporting and Safeguarding PHI Outpatient Services August, UAMS HIPAA Office Anita Westbrook

HIPAA is the Health Insurance Portability and Accountability Act

USES AND DISCLOSURES OF PROTECTED HEALTH INFORMATION: HIPAA PRIVACY POLICY

CHI Mercy Health. Definitions

NOTICE OF PRIVACY PRACTICES

Williamson County EMS (WCEMS) HIPAA Training for Third Out Riders

HIPAA & PRIVACY TRAINING FOR HEALTH PROFESSIONALS: Part 1 Denise M. Hill, JD, MPA

HIPAA Privacy & Security Training

The University of Toledo. Corporate Compliance and HIPAA Training. Presented by: The Compliance and Privacy Office

HIPAA Privacy Training for Non-Clinical Workforce

HIPAA Privacy & Security Training

HIPAA Policies and Procedures Manual

Understanding the Privacy and Security Regulations

AUDIT DEPARTMENT UNIVERSITY MEDICAL CENTER HIPAA COMPLIANCE. For the period October 2008 through May JEREMIAH P. CARROLL II, CPA Audit Director

Chapter 9 Legal Aspects of Health Information Management

East Carolina University 2010 Annual HIPAA Privacy Training

Notice of Privacy Practices

New Patient Information

Safeguarding PHI Nutrition Services. UAMS HIPAA Office May 2015

HIPAA PRIVACY DIRECTIONS. HIPAA Privacy/Security Personal Privacy. What is HIPAA?

HIPAA Education Program

PARAGOULD DOCTORS CLINIC PRIVACY NOTICE

HIPAA Privacy Policies & Procedures Table of Contents

Protecting Patient Privacy It s Everyone s Responsibility

INFORMATION ABOUT Children s Mercy Hospitals and Clinics for our Affiliates

HH Health System-Shoals, LLC dba Helen Keller Hospital Notice of Privacy Practices

This notice describes Florida Hospital DeLand s practices and that of: All departments and units of Florida Hospital DeLand.

Your Role in Protecting Patient Privacy 2018

Returning Volunteer Application

FCSRMC 2017 HIPAA PRESENTATION

IRB 101. Rachel Langhofer Joan Rankin Shapiro Research Administration UA College of Medicine - Phoenix

HIPAA Privacy and Security Training for Researchers

INFORMATION TECHNOLOGY, MOBILES DIGITAL MEDIA POLICY AND PROCEDURES

The HIPAA Privacy Rule and Research: An Overview

HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT

System Office New Hire Orientation

HIPAA Privacy Rights and Operations Guide HIPAA Security Summary For the Practice of: Vail Aspen Breckenridge Dermatology

2018 Employee HIPAA Orientation (EHO) Handbook

HOW TO MAINTAIN A LAB NOTEBOOK- RECORD KEEPING AND HIPAA. Fern Tsien, PhD Department of Genetics LSUHSC

THE JOURNEY FROM PHI TO RHI: USING CLINICAL DATA IN RESEARCH

Title: HIPAA PRIVACY ADMINISTRATIVE

HIPAA Privacy Regulations Governing Research

Faculty Profile. PART I Privacy Training for Health Professionals. Disclaimer. Always Be Prepared 7/11/2013. Why should you care about Privacy?

Chapter 19 Section 3. Privacy And Security Of Protected Health Information (PHI)

INFORMATION ABOUT CHILDREN S MERCY HOSPITALS AND CLINICS

Notice of Privacy Practices

Notice of HIPAA Privacy Practices Updates

Accommodate reasonable requests you may have to communicate health information by alternative means or at alternative locations.

New HIPAA Privacy Regulations Governing Research. Karen Blackwell, MS Director, HIPAA Compliance

It defines basic terms and lists basic principles that all LSUHSC-NO faculty, staff, residents and students must understand and follow.

SUMMARY OF NOTICE OF PRIVACY PRACTICES

Presented by the UAMS HIPAA Office August 2013 Anita B. Westbrook

What is your start date? (Date in which you plan to begin seeing patients in the hospital). Specialty SECTION I. IDENTIFICATION DATA

Commonwealth Health Corporation Notice of Privacy Practices CHC COMMONWEALTH HEALTH CORPORATION

NOTICE OF PRIVACY PRACTICES

NOTICE OF PRIVACY PRACTICES

HIPAA 201: Student Self-Learning Module & Test

ERIE COUNTY MEDICAL CENTER CORPORATION NOTICE OF PRIVACY PRACTICES. Effective Date : April 14, 2003 Revised: August 22, 2016

Failure to comply may result in WU being liable for civil and criminal penalties under the HIPAA regulations.

Parental Consent For Minors to Receive Services

WAKE FOREST BAPTIST HEALTH NOTICE OF PRIVACY PRACTICES

MURRAY MEDICAL CENTER HIPAA NOTICE OF PRIVACY PRACTICES

NOTICE OF PRIVACY PRACTICES

NOTICE OF PRIVACY PRACTICES

Release of Medical Records in Ohio OHIMA. Ohio Revised Code (ORC) HIPAA

Lily M. Gutmann, Ph.D., CYT Licensed Psychologist 4405 East West Highway #512 Bethesda, MD (301)

If you have any questions about this notice, please contact our privacy officer Dr. Jev Sikes at

NOTICE OF PRIVACY PRACTICES

PRIVACY POLICY USES AND DISCLOSURES FOR TREATMENT, PAYMENT, AND HEALTH CARE OPERATIONS

Oklahoma Surgicare NOTICE OF PRIVACY PRACTICES. Effective Date: 02/17/2010

If you have any questions about this notice, please contact the SSHS Privacy Officer at:

PROTECTING PATIENT PRIVACY IS NOT ONLY

Transcription:

1

Objectives At the conclusion of this presentation, students will be able to: Discuss application of HIPAA to student s role. Describe the federal requirements of the HIPAA/HITECH regulations that protect the privacy and security of confidential data. Discuss the penalties that can be imposed for violating HIPAA. Identify what information must be protected. Describe how to protect confidential and sensitive information. State their responsibility for good computer practices. 2

What is HIPAA? HIPAA is an acronym for the Health Insurance Portability and Accountability Act, which was enacted by the US Congress in 1996 and stresses three major areas: 1. Insurance Portability: Ensures that individuals moving from one health plan to another will have continuity of coverage and will not be denied coverage. 2. Fraud enforcement (accountability): Significantly increases the federal government s fraud enforcement authority to reduce health care fraud and abuse. 3. Administrative simplification: Ensures system-wide, technical and policy changes in healthcare organizations in order to protect patient and resident privacy and the confidentiality of identifiable/protected health information (PHI). 3

HIPAA Privacy Act Effective April 14, 2003, each healthcare organization is required to: Give each patient or resident a written Notice of Privacy Practices that describes: How health care organizations may use and share protected health information (PHI) The patient s/resident s privacy rights Ask all patients/residents to sign a written acknowledgment that they received the Notice of Privacy Practices, except in emergency situations. If a signature is not obtained, the health care organization must document the reason why it was not role. 4

HITECH Act The Health Information Technology for Economic and Clinical Health (HITECH) Act, enacted as part of the American Recovery and Reinvestment Act of 2009, was signed into law on February 17, 2009, updated federal HIPAA privacy and security standards. The updates include: Added Business Associates and their contractors/subcontractors to entities that must comply with the HIPAA Act of 1996 and it mandates that these Business Associates are civilly and criminally liable for privacy and security violations, Breach notification requirements for all covered entities, Fine and penalty increases for privacy violations, Right to request copies of the electronic health record in electronic format. 5

A breach is, generally, an impermissible use or disclosure under the Privacy Rule that compromises the security or privacy of the protected health information such that the use or disclosure poses a significant risk of financial, reputational, or other harm to the affected individual. 6

Examples of Breaches Reviewing the medical records of family members, neighbors, celebrities, etc. to see how they are doing. Leaving papers with a patient s/resident s identifiable information in public areas visible to others. Failing to confirm the accuracy of a fax number before faxing patient-identifiable health information. Talking in public areas, talking too loudly, talking to the wrong person. Email or faxes sent to the wrong address, wrong person, or wrong number. User not logging off of computer systems, allowing others to access their computer or system. 7

Used a cell phone to take pictures of a patient/resident. Used a cell phone to record a health care provider explaining a surgical procedure. Posted a picture of themselves with a patient/resident on Facebook. Provided treatment advice to a patient/resident via Twitter. Posted a picture of a patient s/resident's open wound on the Internet. Posted details about their clinical day without mentioning the patient/resident s name, but giving out details about the injuries to allow others to guess who it was. Posted comments to a blog about a patient/resident they care for in the previous year, including the name of the unit. 8

HIPAA rules and the need to protect privacy includes all areas of the facility, (i.e. lobby, cafeteria, chapel, parking garage), not just the clinical unit or your patient/resident. Remember: when you are at a health care organization, approaching a famous person for a picture or autograph could be a breach of HIPAA. Examples of Breaches Medical Center fired 13 employees and suspended at least six others for snooping in the medical records of a famous pop star. Medical Center was fined $865,500 for failing to stop employees from accessing famous celebrities records. Five workers and a student assistant were fired for inappropriately accessing records. Twenty-seven hospital staff were suspended for viewing a famous actor s medical records without authorization. 9

Its is unethical and disrespectful to post negative comments about the health care organizations to which you are assigned for clinical or the staff who work there. Instead, share questions and concerns with your clinical instructor rather than posting it on a it on a social media site. It s easy to lose perspective and commit a security or privacy breach by mentioning private information in negative comments on social media sites. 10

Always maintain a respectful demeanor regarding patient/resident confidentiality. Do the right thing. When you are in the clinical setting you are representing your nursing program; make them proud. When you are in the clinical setting you are allowing the nursing staff and nurse manager to assess your ability to be a part of their patient care team. Think of it as a kind of job interview opportunity; make a positive impression! 11

HIPAA Penalties Verbal or written warnings. Loss of job or dismissal from nursing program HIPAA Criminal Penalties $50,000 - $1,500,000 fines Imprisonment up to 10 years HIPAA Civil Penalties $100 - $50,000 for each violation $1,500,000 for all such violations of an identical provision in a calendar year. State Laws Fines and penalties apply to individuals as well as health care providers; may impact professional licensure. FOR STUDENTS MAY LEAD TO DISMISSAL FROM ACADEMIC PROGRAM. 12

What is Protected Health Information (PHI) PHI is all personal and health information specific to a patient or resident and must be kept confidential Oral Written Electronic 13

Examples of PHI Name, address, date of birth, social security number, phone number, email address, fax number, URL address, IP address, license number, biometric identifiers (finger and voice prints), vehicle identifiers. Medical record, health plan number, diagnosis, photographs, test results, prescriptions and labels on IV bags. Billing information, account number, claim data, referral authorization. Research records. Telephone notes. 14

Uses and Disclosures of PHI Healthcare Organizations may Create, Use and Share PHI for: TPO Treatment that is routinely shared among health care professionals involved in the care to coordinate or manage treatment, both within and outside each healthcare organization, including appointment reminders or laboratory results as part of discharge planning. Payment of health care bills may be shared with the medical insurer so that the health care organization can be paid for services provided to the patient or resident. Operations to assess and improve quality of care or re-allocate resources. The details of a patient s surgical procedure may be shared among surgeons to evaluate the patient s surgery based on the outcome. EXCEPTION: Whenever state law is more stringent, it preempts HIPAA. In Massachusetts, New Hampshire, Maine & Rhode Island, statutorily protected information including HIV status, behavioral health, psychotherapy notes, and sexually transmitted diseases requires patient authorization prior to use / disclosure. 15

Examples of TPO The patient s referring physician calls and asks for a copy of the patient s recent lab report completed at the health care organization (Treatment) A patient s insurance company calls and requests a copy of the patient s medical record for a specific service date (Payment) The Quality Improvement office calls and asks for a copy of an operative report (Health Care Operations) For these TPO purposes, patient information may be provided 16

Other Uses and Disclosures of PHI Facility Directory may include (a) name; (b) location in the health care organization; (c) general condition; and (d) religious affiliation, unless the patient/resident tells the health care organization not to. State Law mandates sharing of the PHI to state agencies under certain circumstances, without the patient s or resident s consent, such as abuse reporting to the Department of Social Services and Death Reports to the Office of the Medical Examiner. Medical Research may use PHI to further medical research, but only after approval by the Institutional Review Board (IRB), when written permission is not required by Federal or State law. 17

HIPAA Rule Mandates that all employees, physicians, volunteers, students and other members of the healthcare organization s workforce follow the HIPAA-required procedures and do the RIGHT THING when it comes to protecting the privacy and security of their patients or residents. 18

Receiving Request for PHI in Emergency Obtain the requesting provider s name, facility name, location and telephone number. Verify the requestor s identity by telephoning the number provided. Document the call and identity of the individual who received the call. Document the information being sought or requested. Document the reason for the request. Provide minimum necessary PHI. Provide additional information requested as in non-emergency. 19

As a Student you may: Look at a person s PHI only if you need it to do your assignment. Use a person s PHI only if you need it to do your assignment. Give a person s PHI to others when it is necessary for them to do their jobs. Talk to others about a person s PHI only if it is necessary to do your assignment. * REMEMBER: If it doesn t pertain to Treatment, Payment or Operations (TPO), don t discuss it. 20

Post any information about a patient/resident, visitor or the health care organization on any social media site, such as: Facebook, Twitter, Tumblr Wikis, Blogs, Podcast, Discussion forums, Photo Sharing, Snapchat, Flickr, Instagram You Tube/Video, etc. 21

Providing for Security of PHI General awareness Use the healthcare organization s policies to know what information is confidential. Never discuss patient/resident information outside the workplace. Be careful not to discuss patient or resident information in hallways, elevators, cafeterias, or other common areas where you may be overheard. Ensure that anyone looking at a patient s/resident s chart or inquiring about information has valid and appropriate identification and a need to know (part of the healthcare team). 22

Providing for Security of PHI Computers Sign on promptly with individual IDs. Do not share your passwords. Log-off computers when finished. Point computer monitors away from the view of visitors or passers-by. Note: Personal information must be protected and encrypted on laptops or other portable devices. Personal information must be encrypted when sent across the internet. 23

Providing for Security of PHI Telephone Do not leave confidential information on an answering machine. Follow established policies about what patient or resident information can be given over the phone. Do not listen to your voice mail messages over the telephone speaker. Never discuss confidential information on an analog mobile phone (although this is illegal, analog calls can be intercepted and recorded). Printers/Copiers Promptly remove printouts of confidential material. Do not leave printouts with a patient s or resident s information unattended. Stay at the copier while copying is in process. Do not forget to take the original. Do not copy a patient s/resident s medical record. If patient/resident requests a copy, follow health care organization s policy. 24

Providing for Security of PHI Email Do not share your password. Never forward messages that have confidential patient information unless authorized to do so. Do not use sensitive information. Emails can be intercepted. Fax Machines Make sure the fax machine is in a secure location. Notify receiver ahead of time that you are faxing information and verify the fax number. After you dial the number, double check it on the display before you press send. Confirm receipt by calling the recipient or checking the transmission report. Retrieve faxed information as soon as it arrives. Always use a cover sheet stating that the information being sent is confidential. If a fax is sent to the wrong machine, contact the recipient and request the fax be destroyed. NOTIFY PRIVACY OFFICER. 25

Providing for Security of PHI Cell Phone Camera Do not use a cell phone camera to take a picture of a patient/resident. Do not text information about a patient/resident. Interviewing Close patient/resident room doors. Close curtains and speak with a softer voice in a semi-private room. Sensitive Data Secure paper records that contain PHI. Destroy, shred or put in the designated bins all papers that could contain PHI. Do NOT put in wastebaskets! Understand healthcare organization s policies for handling any patient/resident information. 26

Security of Electronic Information (ephi) Good security standards follow the 90/10 Rule: 10% of security safeguards are technical 90% of security safeguards rely on the computer user (YOU) to adhere to good computer practices 27

Why is Protecting Privacy & Security so Important? It is the right and ethical thing to do. It is the legal thing to do and the Federal law requires it DO NOT ACCESS INFORMATION THAT YOU DO NOT NEED TO KNOW TO CARE FOR YOUR PATIENT/RESIDENT 28

Patient/Resident Rights Under HIPAA privacy laws, patients/residents have the right to: Have their information protected. Have their questions answered. Receive written notice of how their health information will be used and disclosed. Access their own records and request correction of incorrect or incomplete information. Receive a list of disclosures of information within the previous six years (beginning 4/14/03). Sign an authorization form prior to non-routine uses or disclosures of their health information before the information can be shared with: Employers Insurance Companies Marketing Activities Fundraising Activities 29

Disruption of patient/resident care. Increase cost to institution. Legal liability and lawsuits. Negative publicity. Negative patient/resident perception. Identify theft. Disciplinary action. 30

Summary Patients/residents or their representatives have the right to control who will see their protected health information (PHI). HIPAA privacy requirements have been put in place to protect the patient. NOTE: These HIPAA privacy requirements apply just as much outside the workplace as they do inside. Patient/resident information is never shared outside the workplace, and only as necessary for care within the workplace. 31

References United States Health & Human Services. (AUG. 21, 1996). Public Law 104-191, 104th Congress, Health Insurance Portability and Accountability Act (HIPAA) of 1996. Retrieved from http://www.gpo.gov/fdsys/pkg/plaw- 104publ191/pdf/PLAW-104publ191.pdf. United States Health & Human Services. (n.d.). Health Information Privacy. Retrieved from http://www.hhs.gov/ocr/privacy/hipaa/understanding/coveredentities/breachnotifi cationifr.ht ml United State Center for Medicare and Medicaid. (2013). HIPAA: General Information. Retrieved from http://www.cms.gov/regulations-and-guidance/hipaa- Administrative- Simplification/HIPAAGenInfo/index.html?redirect=/HIPAAGenInfo/02_TheHIPAALaw andrelated%2520information.asp 32