East Carolina University 2010 Annual HIPAA Privacy Training

Similar documents
Information Privacy and Security

Updated FY15 Dignity Health General Compliance Education for Staff Module 2

Privacy and Security For Teammates

What is HIPAA? Purpose. Health Insurance Portability and Accountability Act of 1996

HIPAA PRIVACY TRAINING

Health Information Privacy Policies and Procedures

CLINICIAN S GUIDE TO HIPAA PRIVACY

MCCP Online Orientation

A general review of HIPAA standards and privacy practices 2016

AUDIT DEPARTMENT UNIVERSITY MEDICAL CENTER HIPAA COMPLIANCE. For the period October 2008 through May JEREMIAH P. CARROLL II, CPA Audit Director

Valley Regional Medical Center HIPAA AND HITECH EDUCATION

HIPAA Education Program

Student Orientation: HIPAA Health Insurance Portability & Accountability Act

Advanced HIPAA Communications and University Relations

Chapter 9 Legal Aspects of Health Information Management

HIPAA Training

HIPAA THE PRIVACY RULE

HIPAA Privacy Training for Non-Clinical Workforce

2018 Employee HIPAA Orientation (EHO) Handbook

Study Management PP STANDARD OPERATING PROCEDURE FOR Safeguarding Protected Health Information

HIPAA Health Insurance Portability and Accountability Act of 1996

Health Insurance Portability and Accountability Act. Awareness Training for Volunteers

HIPAA. Health Insurance Portability and Accountability Act. Presented by the UMMC Office of Integrity and Compliance

Title: HIPAA PRIVACY ADMINISTRATIVE

Privacy and Security Compliance: The. Date Presenter Name of Member Organization

The Privacy & Security of Protected Health Information

Williamson County EMS (WCEMS) HIPAA Training for Third Out Riders

Yale University. HIPAA PRIVACY FAQs

It defines basic terms and lists basic principles that all LSUHSC-NO faculty, staff, residents and students must understand and follow.

WHAT IS HIPAA? HIPAA is the ELECTRONIC transmission of Three programs have been enacted to date Privacy Rule April 2004

FCSRMC 2017 HIPAA PRESENTATION

Breach Reporting and Safeguarding PHI Outpatient Services August, UAMS HIPAA Office Anita Westbrook

HIPAA and HITECH: Privacy and Security of Protected Health Information

Patient Privacy Requirements Beyond HIPAA

HIPAA PRIVACY DIRECTIONS. HIPAA Privacy/Security Personal Privacy. What is HIPAA?

NOTICE OF PRIVACY PRACTICES

HH Health System-Shoals, LLC dba Helen Keller Hospital Notice of Privacy Practices

NOTICE OF PRIVACY PRACTICES

USES AND DISCLOSURES OF PROTECTED HEALTH INFORMATION: HIPAA PRIVACY POLICY

HIPAA Privacy & Security Training

Failure to comply may result in WU being liable for civil and criminal penalties under the HIPAA regulations.

The University of Toledo. Corporate Compliance and HIPAA Training. Presented by: The Compliance and Privacy Office

VHA Privacy Policy Training FY VHA Privacy Office

Compliance Program, Code of Conduct, and HIPAA

Notice of Privacy Practices

Health Insurance Portability and Accountability Act (HIPAA)

Compliance & Privacy For Teammates

Notice of HIPAA Privacy Practices Updates

NOTICE OF PRIVACY PRACTICES

PRIVACY POLICY USES AND DISCLOSURES FOR TREATMENT, PAYMENT, AND HEALTH CARE OPERATIONS

REVISED NOTICE OF PRIVACY PRACTICES ORIGINAL DATE: JANUARY 1, 2003 REVISED: JANUARY 16, 2014 REVISED: NOVEMBER 27, 2017 PLEASE REVIEW IT CAREFULLY

Compliance & Privacy For Teammates

What is your start date? (Date in which you plan to begin seeing patients in the hospital). Specialty SECTION I. IDENTIFICATION DATA

Patient Appointment Agreement

NOTICE OF PRIVACY PRACTICES

HIPAA 201: Student Self-Learning Module & Test

HIPAA Policies and Procedures Manual

Parental Consent For Minors to Receive Services

NOTICE OF PRIVACY PRACTICES

PRIVACY POLICIES AND PROCEDURES

CHI Mercy Health. Definitions

HIPAA Notice of Privacy Practices

HIPAA Privacy Rule. Best PHI Privacy Practices

Protecting Patient Privacy It s Everyone s Responsibility

WAKE FOREST BAPTIST HEALTH NOTICE OF PRIVACY PRACTICES

HIPAA Privacy & Security Training

WELCOME. Payment will be expected at the time of service. Please remember our 24 hour cancellation notice.

Protecting PHI for Clinical Staff and Students

HIPAA Privacy and Security Training for Researchers

ENTERPRISE INCOME VERIFICATION (EIV) SECURITY POLICY

National Health Information Privacy and Security Week. Understanding the HIPAA Privacy and Security Rule

I. POLICY: DEFINITIONS:

If you have any questions about this notice, please contact the SSHS Privacy Officer at:

Notice of Privacy Practices

If you have any questions about this notice, please contact our privacy officer Dr. Jev Sikes at

CAPITAL SURGEONS GROUP, PLLC

PATIENT INFORMATION Please Print

Re-Vita -Life. Sub-dermal Bio-identical Pellets

OVERVIEW OF THE USES AND DISCLOSURES OF PHI

NOTICE OF PRIVACY PRACTICES Full Length Version Effective Date: 4/19/2016

This notice describes Florida Hospital DeLand s practices and that of: All departments and units of Florida Hospital DeLand.

THE CHILDREN S INSTITUTE OF PITTSBURGH NOTICE OF PRIVACY PRACTICES

COMPLIANCE PROGRAM. Our commitment to ethical conduct and compliance depends on all employees having a clear understanding of Corporate expectations.

PERSONALLY IDENTIFIABLE INFORMATON (PII)

PROTECTING PATIENT PRIVACY IS NOT ONLY

FEDERAL AND STATE BREACH NOTIFICATION LAWS FOR CALIFORNIA

HIPAA Privacy Policies & Procedures Table of Contents

INLAND EMPIRE HEALTH PLAN CODE OF BUSINESS CONDUCT AND ETHICS. Our shared commitment to honesty, integrity, transparency and accountability

Southwest Acupuncture College /PWFNCFS

ERIE COUNTY MEDICAL CENTER CORPORATION NOTICE OF PRIVACY PRACTICES. Effective Date : April 14, 2003 Revised: August 22, 2016

Catholic Charities Disabilities Services. In-Home Behavioral Support Services (2017)

2018 HCCA Compliance Institute HIPAA Update: Policy & Enforcement. Policy Update: Marissa Gordon-Nguyen HHS OCR Senior Advisor

WISHIN Statement on Privacy, Security, and HIPAA Compliance - for WISHIN Pulse

Mental Health. Notice of Privacy Practices

AN OVERVIEW OF FIPPA for FACULTY, INSTRUCTORS & ADMINISTRATORS. Information and tips on how to keep you FIPPA FRIENDLY

HIPAA Privacy Rights and Operations Guide HIPAA Security Summary For the Practice of: Vail Aspen Breckenridge Dermatology

CENTRAL TEXAS MEDICAL CENTER

HIPAA-HITECH HELPBOOK NJ Physician Practices

Compliance and Privacy/Security Training Academic Year

NOTICE OF PRIVACY PRACTICES

Transcription:

East Carolina University 2010 Annual HIPAA Privacy Training

What are the HIPAA Privacy and Security Rules? Federal laws that govern the use and disclosure of health information of our patients and research study subjects At East Carolina University, these rules apply to (i) any health care provider who submits claims in standardized electronic form for payment; and (ii) any health plan. Also applies to the business associates of these providers and health plans. Each ECU entity that is subject to the HIPAA privacy and security rules is called a Health Care Component

ECU Health Care Components ECU Health Care Components include: ECU Physicians Practice Plan School of Allied Health Speech and Language Clinic ECU Physical Therapy at FireTower Clinic Telemedicine Center The Brody School of Medicine (but only those areas supporting ECU Physicians Practice Plan such as Patient Financial Services, Office of the Dean, Office of Risk Management, applicable University Attorneys, Office of Compliance, etc.) Office of Prospective Health Division of Student Affairs Student Health Services Children s Developmental Services Agency Division of Academic Affairs Human Performance lab ITCS (but only those individuals who have access to PHI) ECU Office of Internal Audit and Management Advisory Services Accounts Payable Department ECU Health Plans Bankruptcy Notification Group

What Information is Protected under HIPAA? Information that is created or received in the course of providing treatment, obtaining payment for services or performing research; and Relates to the (i) past, present or future physical or mental health or condition of an individual; (ii) the provision of health care to an individual; or (iii) the past, present, or future payment for the provision of health care to an individual. Includes information in any medium verbal, written or electronic This information is called protected health information (PHI) under HIPAA

Examples of PHI Protected Health Information Includes: Patient name Address (including street, city, zip code, etc.) Name of employer Dates (date of birth, admit date, discharge date, etc.) Telephone and fax numbers Patient email address Social security number Health plan number Billing records Appointment Schedules Medical record information (e.g. physician and nursing notes, test results, prescriptions, etc.) Research records

Notice of Privacy Practices In order for an ECU Health Care Component to be able to use and disclose PHI, each patient must be given the Notice of Privacy Practices (NPP) at his or her first visit The NPP describes how ECU may use and disclose a patient s PHI and advises the patient of his/her privacy rights NPPs must be posted in all patient service delivery areas of every Health Care Component ECU must attempt to document the patient s receipt of the NPP ECU Physicians has an IDX field to populate information indicating whether an NPP has been received by the patient. The cover of the NPP must be sent to Health Information Systems/Services and it is scanned in the medical record Other providers not operating in IDX should try to document that the patient has received the NPP and it must be filed in the patient s medical record.

When Authorization is Not Required An ECU Health Care Component may use or disclose PHI without an authorization for the following purposes: Treatment: Treatment includes direct patient care, coordination of care, consultations, referrals to other health care providers, appointment reminders Payment: Payment includes any activities required to billing and collect for services provided to patients (e.g., submission of claims to payors, debt collection, etc.) Health Care Operations: Health Care Operations are those activities related to our business and oversight activities including quality improvement, monitoring and auditing activities, business planning and development, risk management activities, etc.

When Authorization is Required For use and disclosure of PHI that is not for treatment, payment, or health care operations, a written authorization is needed from the patient. Example: Disclosures of PHI to a patient s employer, attorney or for research when the UMCIRB has not provided a waiver of authorization. A written authorization is required from the patient for disclosures of psychotherapy notes and other sensitive conditions (HIV status, etc.) in all situations HIPAA privacy rules have very specific requirements on the wording that must be put in the authorization. Please do not try and create your own HIPAA authorization there is a form available on the ECU HIPAA website at http://www.ecu.edu/cs-dhs/hipaa/customcf/privacyforms/authorization%20for%20use%20or%20disclosure.pdf

Requirement to Disclose Only Minimum Necessary Amounts of PHI Except for any use or disclosure of PHI for treatment purposes, HIPAA only allows users to access or disclose the least amount of PHI necessary to perform their duties. Example: If a patient s life insurance company had a valid HIPAA authorization to obtain information related to the patient s heart condition or for treatment provided during a certain time period, we could not disclose patient information unrelated to the heart condition or information outside of the time period stated on the authorization.

Patient Rights Under HIPAA Patients have the following rights under HIPAA: The right to access and obtain a copy of their PHI New: Effective 2/18/2010, patients have the right to request their PHI in an electronic format per the 2009 American Recovery and Reinvestment Act (2009 ARRA) The right to request an amendment to their PHI The right to request further restrictions on the use and disclosure of their PHI (i.e., additional restrictions to those already in place under the HIPAA privacy rules) New: Effective 2/18/2010, patients have the right to restrict disclosure of their PHI to a health plan for the purposes of carrying out payment or health care operations if the service has been paid out of pocket in full on the patient s date of service

Patient s Rights Under HIPAA Cont d Patient s Rights Under HIPAA Continued The right to request alternative forms of communication related to their PHI (for example, the right to request to have PHI mailed to a different address, or the right to request that no messages be left on a particular phone line, etc.) The right to an accounting of the disclosures of their PHI If a patient makes any of these types of requests, please have the patient complete the applicable forms that can be found on the ECU HIPAA web page at http://www.ecu.edu/cs-dhs/hipaa/privacy/forms.cfm

Filing a HIPAA Privacy Complaint HIPAA Privacy complaints may be submitted in any manner (in writing, verbal, e-mail) to the ECU HIPAA Privacy Officer (contact information below). Any staff or faculty receiving a privacy complaint from a patient should contact the ECU HIPAA Privacy Officer with the relevant information or immediately complete a Privacy Complaint form located at http://www.ecu.edu/cs-dhs/hipaa/privacy/forms.cfm and forward such form to the ECU HIPAA Privacy Officer. Patients are also permitted to file a HIPAA Privacy complaint directly with the federal government (the Department of Health and Human Services Office of Civil Rights). The ECU HIPAA Privacy Officer contact information: Kenneth A. DeVille, JD, PhD Interim HIPAA Privacy Officer 2W-31 Brody Medical Sciences Building 600 Moye Boulevard Greenville, NC 27834 (252) 744-5200 devillek@ecu.edu There will be no intimidation or retaliatory actions against anyone making a complaint in good faith.

Incidental Uses and Disclosures of PHI As a practical matter, there is no way to protect every use and disclosure of PHI Any use or disclosure that cannot reasonably be prevented and is limited in nature is not prohibited under HIPAA Example: Discussions during teaching rounds; calling out a patient s name in the waiting room; sign-in sheets in clinics. These are permitted, so long as reasonable safeguards are used to protect PHI.

Employee Access to Protected Health Information PHI may not be accessed by any employee except for the sole purpose of performing employment duties and responsibilities You cannot access your family s PHI or your own PHI without completing the proper release/authorization forms at ECU Health Information Systems/Services You may access PHI only if you have a legitimate business purpose and need the PHI to do your job (e.g., treatment, payment, or health care operations) Review of audit trails is used to monitor compliance of employees access to PHI. Inappropriate access to PHI will result in disciplinary action according to the ECU HIPAA policy on sanctions

Disclosure of PHI to a Patient s Family or Friends You may disclose PHI to a patient s family or friends who are present with the patient and involved in the patient s care without obtaining an authorization from the patient. Professionals can use their professional judgment on whether or not to disclose PHI to a patient s family or friends if the patient is not present with the family or friend or if the patient is not competent to agree to the disclosure.

Faxing PHI Fax PHI only when mail delivery is not fast enough to meet the patient s needs. Use a cover page which includes a confidentiality notice. If you are unsure of whether the receiving fax machine is in a private location, contact the fax recipient and let them know to wait by the machine until you fax the PHI. If you are unsure of the fax number, telephone the fax recipient prior to faxing PHI to confirm the fax number. Do not use speed dial buttons when faxing PHI, dial the number using appropriate care.

New State Laws About Collection, Use, or Disclosure of Social Security Numbers Social security numbers (SSNs) are considered PHI under HIPAA however, the collection, use or disclosure of SSNs is now subject to stricter requirements under state law and University policy http://www.ecu.edu/cs-itcs/policies/ssnpolicy.cfm. SSNs may only be collected, used, and/or disclosed by ECU and its employees as permitted by law and University policy, and only in furtherance of legitimate University business. SSNs are no longer permitted to be mailed (including ECU campus mail). Any collection, use or disclosure of SSNs must be approved by the University s Identity Theft Protection Committee (ITPC). Forms and instructions about this approval process are available at http://www.ecu.edu/cs-itcs/ssnresource/forms.cfm If you have any questions about these new requirements, you may email the ITPC at ITPC@ecu.edu

Proper Disposal of PHI Shred or properly dispose of all documents containing PHI that are not part of the official medical record. Do not dispose of PHI into the general trash PHI waiting to be shredded should be placed only in secured bins do not place in any unsecured trash bin even if the trash bin is not located where it s easily accessible to patients.

System Passwords Keep your password confidential do not share it with anyone Physicians do not share your password for any purpose It is important to use strong passwords If you must write down your password Store it in a secure location Don t store it near your computer

Use and Disclosure of PHI for Research Any human subjects research involving the use or disclosure of PHI must have the appropriate researchrelated HIPAA forms reviewed and approved by the UMCIRB prior to access of any PHI for research purposes. Any investigator wishing to access PHI in preparation for research must comply with the policies for reviews preparatory to research. Any investigator wishing to access PHI for research on decedents must comply with the policies for research on decedents. HIPAA research policies, procedures and forms are available at http://www.ecu.edu/irb

Use and Disclosure of PHI for Fundraising Purposes May access only demographic information and dates of service for fundraising purposes. Disease, diagnosis or condition may not be used to develop a fundraising mailing list. ECU medical records or billing systems may not be accessed to obtain names of patients who have received a particular form of treatment for the purpose of soliciting those patients for fundraising purposes (either directly asking for donations or asking them to participate in a fundraising event, e.g., Walk for the Cure). Must obtain a valid HIPAA authorization from the patient to use any other PHI for fundraising. Per the 2009 American Recovery and Reinvestment Act, patients must be given a clear opportunity to opt-out of fundraising communications.

HIPAA Do s and Don ts Treat all PHI as if you were the patient and it was your personal information. Don t be careless with PHI in any form (verbal, paper or electronic). E-mailing of PHI is discouraged; e-mail messages can be intercepted by third parties or mistakenly sent to the wrong e-mail address. If you must e-mail PHI, please contact ITCS to obtain the appropriate encryption software for e-mail. Appropriate safeguards must be taken to prevent unauthorized access of PHI before sending PHI via e-mail to locations outside of the ECU internal network (including e-mail to Pitt County Memorial Hospital). Contact the ITCS Helpdesk for assistance.

HIPAA Dos and Don ts Do not share passwords for any purpose (no sharing with students, nurses, physicians, etc.). Discuss PHI in closed environments, or use a low voice so that others cannot overhear the discussion. Do not access any PHI unless you need it to perform your job; improper access will result in disciplinary action according to ECU policies.

Workstation Security Practices You must protect your workstation and the electronic PHI (EPHI) for which you have access from unauthorized access. Workstations are defined as desktop computers, laptops, personal digital assistants (PDA), and other electronic devices that you may use to access EPHI. At a minimum: Do not download or install any software not required for your official job duties Do not open email attachments without verifying the sender Ensure that your monitor or display screen containing any EPHI is positioned to prevent viewing by unauthorized individuals.

Workstation Security Practices-Continued Log off from your workstation when your shift is complete. Ensure that your workstation is locked when unattended. Store all media (e.g., diskettes, zip disks, and flash drives) that contain EPHI in a secure location. When disposing of media with EPHI, the data must be removed with data sanitizing software or the media must be physically destroyed. Questions concerning the destruction of EPHI should be directed to the University Privacy Officer. Visit http://www.ecu.edu/cs-itcs/itsecurity/safecomputing.cfm

Wireless Networking and Purchase of Software Wireless Networking and EPHI: Do not access EPHI over a wireless network, unless the data is encrypted prior to transmission. Two possible encryption alternatives include the University s Citrix system and the University s Virtual Private Network (VPN). Data sent over a wireless network can be captured by unauthorized persons in nearby buildings, parking lots, and streets. Contact ITCS Security Department prior to purchasing any computing system that will store or transmit EPHI in order to ensure that the system has appropriate security measures in place. You must also make sure the system or software is compatible with HealthSpan.

Storing EPHI on Workstations Do not store EPHI on your workstation. An alternative is storing the EPHI on a secure server or a secure network storage device such as Piratedrive. If your job requires you to store EPHI on your workstation or departmental server, you are required to contact ITCS to receive further instructions related to such storage.

EPHI and Portable Device Security Devices that contain PHI must have a power on password. Label device with contact information. Devices storing, accessing or transmitting EPHI must use AES standard encryption for all data that is stored on the device. Encryption is mandatory for all portable devices that contain PHI. Contact ITCS to obtain appropriate encryption software. EPHI shall remain on the device only as long as necessary. Bluetooth Infrared shall be disabled while connected; network connection must be achieved via ECU s Network.

EPHI and Portable Device Security- Continued Devices must have an antivirus installed and updated to most recent definitions. The device must not be shared among others. Before transfer of ownership, the device must be securely wiped of all EPHI. The device must implement a device reset with data erasure after 5 consecutive failed login attempts. Portable devices must be physically secured; user must take steps to prevent the loss or theft of the device. Device must be powered to log-off or power down after 15 minutes of inactivity. Any loss, theft, or suspected unauthorized use of the device must be reported to the ECU Police and ECU HIPAA Privacy Officer or ECU HIPAA Security Officer immediately.

Reporting of Losses or Misuses of PHI You must immediately report all losses or misuses of PHI to the ECU HIPAA Privacy Officer or ECU Security Officer Kenneth DeVille, JD, PhD, Interim ECU HIPAA Privacy Officer, 744-5200 or devillek@ecu.edu Margaret Umphrey, ECU HIPAA Security Officer, 328-9000 or streeterm@ecu.edu

Security Breach Notification Requirements First federal notification law For breach of any unsecured PHI, the covered entity is required to notify within 60 days each individual whose PHI has been accessed, acquired or disclosed if such breach results in a significant risk of harm to the individual whose PHI was breached. Unsecured PHI is generally PHI that is not encrypted or PHI that is readable. In addition, must notify HHS of such breach within 60 days if breach involves 500 or more individuals and prominent local media must also be notified. Annual disclosure requirement to HHS regarding notifications Excludes certain inadvertent or unintentional disclosures

Disciplinary Actions Employees and students who violate the HIPAA privacy or security policies are subject to disciplinary action up to and including termination. Per ECU policy, the type of disciplinary action is based on the level of the HIPAA privacy or security violation.

ECU HIPAA Privacy Violation Levels & Sanctions Violation Level 1 Failure to demonstrate appropriate care of PHI Examples: Failing to log off a computer Leaving PHI in a non-secure location Inappropriate hallway conversation

ECU HIPAA Privacy Violation Levels & Sanctions (Continued) Violation Level 2 Improper exposure of PHI within the covered entity resulting in no further improper disclosure of PHI. Examples: Repeated Level 1 violations Sharing of password with someone who otherwise has a business purpose to view the PHI accessed with your password

ECU HIPAA Privacy Violation Levels & Sanctions (Continued) Violation Level 3 Improper disclosure of PHI within the covered entity or outside of covered entity Repeated Level 2 violations Examples: Failing to perform necessary actions to prevent disclosure of PHI

ECU HIPAA Privacy Violation Levels & Sanctions (Continued) Violation Level 4 Intentional abuse of PHI Examples: Large scale disclosure Use for personal gain Destroying PHI

Federal Penalties under HIPAA Under the 2009 American Recovery and Reinvestment Act, enforcement of the HIPAA Privacy and Security rules has been heightened. Four new tiers of Civil Monetary Penalties (CMP): Range from $100 to $50K for each violation $25K to $1.5 million for similar violations within a calendar year Tiers based on level of culpability, knowledge, etc. Authorizes state attorneys general to bring a civil action in federal district court against individuals who violate the HIPAA rules. General Attorney s Office is tasked with recommending a methodology to HHS to allow harmed individuals to receive a percentage of any CMP or monetary settlement. Requires periodic audits of covered entities and business associates for compliance. Criminal Penalties $50,000 to $250,000 monetary penalties Prison time 1 to 10 years, depending on situation

HIPAA Privacy Quiz Which of the following are examples of protected health information (PHI) under HIPAA? a. Patient billing records b. Date of birth c. Address d. Lab reports e. Appointment schedules f. All of the above Correct answer is f. Any information that can reasonably be used to identify an individual is consider PHI.

HIPAA Privacy Quiz In what situation may you use or disclose PHI without a written authorization from the patient: a. To provide information to a consulting physician, if that is part of your job. b. To provide information to the health insurance company for payment purposes, if that is part of your job. c. To access the medical record to review a possible medical error, if that is part of your job. d. For non-work related reasons, to help a family member or friend obtain their test results. e. All of the above. f. Answers a, b, and c. The correct answer is f. Use may use or disclose PHI without a written authorization from the patient for treatment, payment or health care operations.

HIPAA Privacy Quiz In the morning, your co-worker left you a message stating that she will be in later because she has a doctor s appointment at ECU Physicians. You are permitted to access your co-worker s appointment information in the medical record to see when she will return to work. a. True b. False The correct answer is b. You are not permitted to access PHI unless you have a legitimate business purpose for treatment, payment and health care operations.

HIPAA Privacy Quiz You are working on a UMCIRB-approved research project and would like to download PHI onto a USB flash drive (memory stick) for more convenient use. Which of the following is required under law and ECU policy? a. All PHI must be encrypted. b. The memory stick must be adequately secured to prevent loss or theft. c. Prior to disposal, all PHI must be securely deleted from the device. d. Proper authorization (or waiver of authorization) must be in place prior to use of any PHI in the research project. e. All of the above The correct answer is e. When PHI is stored on a flash drive, (i) the flash drive must be password protected; (ii) all PHI must be encrypted; (iii) all information must be securely deleted from the device prior to disposal and (iv) proper authorization must be in place prior to use of any PHI.

HIPAA Privacy Quiz What should be done with PHI in paper form when no longer needed? a. Place in a locked container for shredding. b. Place in your trash can by your desk. c. Take it home so you can shred it later in your home office shredder. The correct answer is a. PHI in paper form should either be shredded when no longer needed or put in a locked storage bin for shredding at a later date.

HIPAA Privacy Quiz Which are good workstation security practices that you should always perform? a. Make sure someone else in your office or clinic knows your computer password so you always have access to data on your system should you need something while you are away from the office or clinic setting. b. Always lock or log off your computer when you step away from your desk or clinic workstation. c. Position your computer screen in a manner so patients or co-workers cannot view other patients PHI. d. Answers b and c. The correct answer is c. It is never permissible to share your password with anyone for any reason.

HIPAA Privacy Quiz ECU Health Care Components are now subject to strict notification requirements in the event of certain types of security breaches of PHI and may also be subject to stringent penalties. a. True b. False The correct answer is a. Under the 2009 American Recovery and Reinvestment Act, ECU Health Care Components are now subject to federal and state Breach Notification requirements.

HIPAA Privacy Quiz If you commit a Level 3 HIPAA privacy violation (which would include intentional improper access of PHI and further disclosure of that individual s PHI) you will likely be subject to disciplinary action ranging from a written warning to termination of employment. a. True b. False The correct answer is a. Under ECU HIPAA Privacy Policy #0002, Sanctions, disciplinary action for a Level 3 HIPAA Privacy Violation is a written warning up to termination of employment.

HIPAA Privacy Quiz When it is necessary to fax PHI to another location, which of the following practices should be followed: a. A cover sheet should be used indicating that the attached is confidential patient information with contact information of whom to call in the event PHI is faxed to the wrong location. b. Verify the fax number of the location to where PHI is being sent. c. Prior to faxing the PHI, inquire as to whether the receiving fax is in a public or private location; if public location, call before faxing to have an individual waiting to receive the faxed PHI. d. All of the above. The correct answer is d. When faxing PHI always use a cover sheet with a confidentiality statement, verify the fax number and call to let the recipient of the fax know you are sending PHI and to wait by the fax for the information.

HIPAA Privacy Quiz Your mother is a patient at ECU Physicians. She asks you to go into her medical record and print out her lab results and you agree to do it. What is the correct choice below? a. This practice is acceptable because your mother gave you verbal permission to access her medical record. b. You are an employee and thus do not have to go through the same procedures as patients do to obtain copies of medical records. c. You should tell your mother that you cannot access her record until she completes a Release of Information form and submits that form to ECU Health Information Systems/Services (HIS/S). HIS/S will then provide her with the necessary information. The answer is c: Employees need to follow the same rules and procedures for access to family medical records just like any other patient even if there is verbal permission from the family member.

HIPAA Privacy Quiz You are a teaching physician at ECU. You have been on call for the past 24 hours and are exhausted. Instead of having to document the past history and physical of a patient in the electronic medical record, you decide to allow the medical student to use your password to document for you. Which is correct? a. This practice is fine because you are telling the medical student word-forword what to document so you are confident there will be no mistakes. b. This practice is fine because you are exhausted and you are afraid you will make mistakes in the chart if you document yourself. c. This practice is not acceptable because it is never permissible to share your password for the electronic medical record for any purpose. The correct answer is c: Regardless of the circumstances, it is never permissible to share your password.

HIPAA Privacy Quiz Mrs. Jones is a member of your church and is being seen at ECU Physicians for a chronic condition. You are a part of Mrs. Jones patient care team. You regularly see Mrs. Jones at the clinic and have in-depth knowledge about her condition. Someone at your church knows you work for ECU Physicians and asks you about Mrs. Jones health condition because Mrs. Jones hasn t been at church in awhile. How should you respond? a. Tell the individual the latest update on Mrs. Jones condition because you just saw her in the clinic that previous week. b. Tell the individual how Mrs. Jones is doing because you know Mrs. Jones would not mind if the church members knew of the recent changes in her condition. c. Explain to the individual that you cannot comment on Mrs. Jones health condition and that the individual should ask Mrs. Jones herself about her health condition. The correct answer is 3: Because this disclosure is not for the purpose of treatment, payment, or health care operations, Mrs. Jones would need to complete a HIPAA authorization before you could disclose information about her health condition to outside individuals not involved in her care.

HIPAA Privacy Quiz Mr. Smith is seen by ECU Physicians for his annual physical. During registration for the visit, Mr. Smith tells the patient access representative that he does not want his health plan made aware of the visit or the results of his physical. Which is correct? a. ECU Physicians cannot accommodate Mr. Smith s request because we must always bill the insurance carrier on file. b. ECU Physicians will accommodate Mr. Smith s request if he pays for the visit in full on the date service is provided. c. ECU Physicians will accommodate Mr. Smith s request and invoice him directly for the service. d. None of the above. The correct answer is b. If Mr. Smith pays for the visit in full on the date the service is provided, ECU Physician s will not bill his health plan nor release the results of the services performed on that date to the health plan.

HIPAA Privacy Quiz You are performing research at ECU and are storing PHI from research subjects on a flash drive (external storage device). The flash drive gets stolen and was not password protected and encrypted. What should you do? a. Immediately begin to call the study subjects and make them aware that their PHI is now in an unknown location. b. Do nothing nobody will be able to understand the information contained on the flash drive and you don t want to get in trouble because you knew the device should have been password protected. c. Immediately notify the ECU HIPAA Privacy Officer or ECU HIPAA Security Officer and ECU Police. The correct answer is c: You should not begin notifying study subjects yourself nor should you do nothing. Instead, you need to immediately notify the ECU HIPAA Privacy Officer or ECU HIPAA Security Officer and the ECU Police so appropriate actions can be taken. Always password protect any portable electronic devices that contain PHI and encrypt the data.

HIPAA Privacy Quiz The neighbor of an ECU Physicians employee is having marital problems and tells the employee her husband is having an affair with Ms. Doe and fears that she may have contracted a sexually transmitted disease (STD) from her husband. Which is correct? a. The employee may check the medical records to see if Ms. Doe is a patient; and if so, may look in Ms. Doe s chart to check if she has tested positive for a STD because she is concerned for her friend. b. The employee may check her neighbor s husband s medical records to determine if he has been seen for and has tested positive for a STD to confirm her friend s suspicions. c. The employee may not check the medical record of Ms. Doe or the neighbor s husband to obtain any information for her friend. d. The employee may ask a co-worker that does not know her neighbor or the husband to check Ms. Doe s medical record to determine if she has tested positive for a STD. The correct answer is c. Employees may not access PHI for personal gain. They may only access PHI for the sole purpose of performing their jobs.

East Carolina University 2010 Annual HIPAA Privacy Training Print Name: Signature: Date: Quiz Certification Academic Dept/Program: To print this acknowledgement of training go to: File-Print-Current Slide-OK