Privacy and Security Training for Connecting Ontario. PACE Cardiology April, 2017

Similar documents
Compliance with Personal Health Information Protection Act

Advanced HIPAA Communications and University Relations

Overview of Privacy Legislation in Ontario

PERSONAL HEALTH INFORMATION PROTECTION ACT (PHIPA) Frequently Asked Questions (FAQ s) Office of Access and Privacy

Snooping Rights and Responsibilities

Health Care Provider Guide Digital Health Drug Repository. Version: V 3.0

Mandatory Reporting and Breach Notification Changes to PHIPA and what you need to know

A PHIPA Update from the IPC

Compliance Program, Code of Conduct, and HIPAA

The Privacy & Security of Protected Health Information

HIPAA and HITECH: Privacy and Security of Protected Health Information

Information Privacy and Security

A Deep Dive into the Privacy Landscape

It defines basic terms and lists basic principles that all LSUHSC-NO faculty, staff, residents and students must understand and follow.

HIPAA Privacy Training for Non-Clinical Workforce

HIPAA Training

Privacy and Security For Teammates

Report Published under Section 48(2) of the Personal Data (Privacy) Ordinance (Cap. 486) Report Number: R

Updated FY15 Dignity Health General Compliance Education for Staff Module 2

Mandatory Reporting A process

PSYCHOTHERAPIST-PATIENT SERVICES AGREEMENT COLORADO

Privacy Toolkit for Social Workers and Social Service Workers Guide to the Personal Health Information Protection Act, 2004 (PHIPA)

John W. Steele, Ph.D., Licensed Psychologist 1285 Fairfield Drive, Boulder, CO 80305

What to do When Faced With a Privacy Breach: Guidelines for the Health Sector. ANN CAVOUKIAN, Ph.D. COMMISSIONER

System Office New Hire Orientation

Informed Consent for Assessment

Breach Reporting and Safeguarding PHI Outpatient Services August, UAMS HIPAA Office Anita Westbrook

IVAN FRANKO HOME Пансіон Ім. Івана Франка

COLLEGE OF DIETITIANS OF ONTARIO BY-ELECTIONS DISTRICT 2 Non-Council Member Carolyn Lordon RD DISTRICT6 Council Member Terry Koivula RD

Technology Standards of Practice

WISHIN Statement on Privacy, Security, and HIPAA Compliance - for WISHIN Pulse

DUTIES OF A CUSTODIAN

Health Information Exchange 101. Your Introduction to HIE and It s Relevance to Senior Living

AN OVERVIEW OF FIPPA for FACULTY, INSTRUCTORS & ADMINISTRATORS. Information and tips on how to keep you FIPPA FRIENDLY

OREGON HIPAA NOTICE FORM

Reporting a Privacy Breach to the Commissioner

THE ACD CODE OF CONDUCT

What is your start date? (Date in which you plan to begin seeing patients in the hospital). Specialty SECTION I. IDENTIFICATION DATA

Managing Patient Consent on the echn Portal

Healthcare Privacy Officer on Evaluating Breach Incidents A look at tools and processes for monitoring compliance and preserving your reputation

Protecting Patient Privacy It s Everyone s Responsibility

ONE ID Local Registration Authority Procedures Manual. Version: 3.3

2018 Employee HIPAA Orientation (EHO) Handbook

HIPAA Health Insurance Portability and Accountability Act of 1996

Chapter 9 Legal Aspects of Health Information Management

Piedmont Healthcare, Inc. Code of Conduct

LICENSED CLINICAL SOCIAL WORKER-PATIENT SERVICES AGREEMENT

MCCP Online Orientation

HIPAA PRIVACY DIRECTIONS. HIPAA Privacy/Security Personal Privacy. What is HIPAA?

Williamson County EMS (WCEMS) HIPAA Training for Third Out Riders

FEDERAL AND STATE BREACH NOTIFICATION LAWS FOR CALIFORNIA

Getting Ready for Ontario s Privacy Legislation GUIDE. Privacy Requirements and Policies for Health Practitioners

PRIVACY BREACH MANAGEMENT POLICY

If you have any questions about this notice, please contact the SSHS Privacy Officer at:

Overview. COTBC Practice Standards for Managing Client Information, Tel: (250) Toll-Free BC: 1 (866) Fax: (250)

Report of the Information & Privacy Commissioner/Ontario. Review of the Cardiac Care Network of Ontario (CCN):

Navpreet Kaur IT /16/16. Electronic Health Records

PATIENT BILL OF RIGHTS & NOTICE OF PRIVACY PRACTICES

Report of the Information & Privacy Commissioner/Ontario. Review of Cancer Care Ontario:

East Carolina University 2010 Annual HIPAA Privacy Training

CIRCLE OF CARE. Ann Cavoukian, Ph.D. Information and Privacy Commissioner, Ontario, Canada

HIPAA Privacy & Security

Compliance & Privacy For Teammates

USES AND DISCLOSURES OF PROTECTED HEALTH INFORMATION: HIPAA PRIVACY POLICY

Sandra V Heinsz, Ph.D. Informed Consent Services Agreement

2018 ABOS Part II Oral Examination

The University of Toledo. Corporate Compliance and HIPAA Training. Presented by: The Compliance and Privacy Office

Working with Information Governance INFORMATION GOVERNANCE REFRESHER TRAINING WORK BOOK

REVIEWED BY Leadership & Privacy Officer Medical Staff Board of Trust. Signed Administrative Approval On File

DO ASK BUT DON T TELL HIPAA PRIVACY RULE

NOTICE OF PRIVACY PRACTICES

Privacy and Security Compliance: The. Date Presenter Name of Member Organization

PROFESSIONAL STANDARDS FOR MIDWIVES

A general review of HIPAA standards and privacy practices 2016

Compliance Program And Code of Conduct. United Regional Health Care System

Resident/Fellow Training Orientation Policies

Advertising Practice Standard

HH Health System-Shoals, LLC dba Helen Keller Hospital Notice of Privacy Practices

N C MPASS. Clinical Self-Scheduling. Version 6.8

Data Breach Notification Guide Policies and Procedures

Your Role in Protecting Patient Privacy 2018

HIPAA Privacy & Security Training

LPN Continuing Competence Program

Compliance & Privacy For Teammates

If you have any questions about this notice, please contact our privacy officer Dr. Jev Sikes at

COMPLIANCE PROGRAM. Our commitment to ethical conduct and compliance depends on all employees having a clear understanding of Corporate expectations.

HIPAA Privacy Rights and Operations Guide HIPAA Security Summary For the Practice of: Vail Aspen Breckenridge Dermatology

Information Sharing and HIPAA Compliance

New York Notice Form Notice of Psychologists Policies and Practices to Protect the Privacy of Your Health Information

PEDIATRIC HEALTH ASSOCIATES HIPAA NOTICE OF PRIVACY PRACTICES

Accessing HEALTHeLINK

Information Governance: The Refresher Module (Revision and Update)

INFORMED CONSENT DOCUMENT. Project Title: The Contraceptive Choice Center: an innovative health services delivery and payment model

What is HIPAA? Purpose. Health Insurance Portability and Accountability Act of 1996

Memorial Hermann Information Exchange. MHiE POLICIES & PROCEDURES MANUAL

Teleworking and access to ECHA IT systems

Lou Eckart, Ph.D. and Associates Licensed Clinical Psychologists 22 Mill St. Suite 305 Arlington, MA

HIPAA THE PRIVACY RULE

INCOMPLETE APPLICATIONS WILL NOT BE PROCESSED

Compliance and Privacy/Security Training Academic Year

Transcription:

Privacy and Security Training for Connecting Ontario PACE Cardiology April, 2017

Session Goals By the end of this session you will: Review key elements of privacy protection Know your privacy obligations when using clinical systems Know the added privacy obligations arising when clinical systems are shared systems

What s New in this Session? Mainly, shared systems such as ConnectingOntario, which Combine patient information from several healthcare organizations Permit access only for providing care or assisting in provision of care NOT for research, quality improvement, education or any other purpose May permit patients to block access to their information and May let you know a patient has blocked access and give you options for responding to the block

Basic Background Privacy: the right to control access to information about oneself. Patients exercise this control by consenting to access for specific purposes. PHI stands for Personal Health Information: practically any information related to the health or health care of an identifiable person. PHIPA stands for the Personal Health Information Protection Act, 2004 the key law protecting PHI And patient privacy in Ontario.

Under the PHIPA privacy law PACE and its Agents including you must protect PHI and privacy. The two most important rules to know are these: 1. Access only PHI you need to know to perform your PACE duties 2. Promptly report suspected privacy breaches to the PACE privacy office A privacy breach occurs when PHI is lost, stolen or subject to unauthorized access, or when policies aimed at protecting privacy are violated. If you breach privacy, PACE and/or a professional college may discipline you.

Privacy Protection Matters When you help protect privacy, you Help ensure patient confidence in privacy protection, so that patients are willing to share all the information vital to their care Honour the trust patients place in you and PACE Cardiology Show respect for patients as individuals Help protect your own reputation and PACE s Avoid harm to patient and penalties for you and PACE Meet legal, ethical and professional obligations

Breach Penalties are Increasing Organizations (including PACE) can now be fined up to $500,000 for an offense under PHIPA, and individuals (including you) up to $100,000 AND organizations can now face lawsuits including class actions, and individuals can face civil litigation and prosecutions AND increasing media attention and scrutiny by the Privacy Commissioner s office means increased reputational risk for PACE and for individuals.

Using Clinical Systems Clinical Systems are computer systems used to support patient care (e.g., the PACE Cerebrum EMR, the ConnectingOntario system). Important points about clinical systems: Practically anything you access through them is PHI, and therefore is subject to protection obligations They track which PHI you access, and when you access it Those responsible for these systems (e.g., PACE, ehealth Ontario) are obliged to audit user activity, to ensure that privacy rules are followed.

Using Clinical Systems Important points (continued): Read carefully any End User Agreement or I agree statement you see when using these systems. They commit you to privacy-protective obligations. Commonly detected breaches include looking at the PHI of friends, relatives, neighbours, colleagues or celebrities. Unauthorized use of clinical systems will result in penalties. Violators are increasingly being caught and punished. Example: Ontario student fined $25,000 for accessing personal health info without permission Globe and Mail, March 16, 2017

Using Clinical Systems If you are ever in doubt about whether you may access PHI, consider this question: Do I need to access this PHI in performing my PACE-assigned duties, and if so, could I later explain that need? If the answer in either case is No, refrain from access.

If a patient has a question or complaint about the protection of PHI or privacy, please: 1. let them know their issue is important to you and to PACE, and that you will address it either directly, or through the PACE privacy office 2. address the issue if you can, or if not, 3. let them know that the privacy office (1-888-978-4701) will help.

If a patient asks for access to PHI 1. Acknowledge their right to make the request and have it addressed. 2. If the request is informal can be met readily, without disrupting care and is not subject to any unusual restrictions then fulfill it on the spot. 3. Otherwise refer the patient to the PACE privacy office (1-888-978-4701).

If a patient wants to restrict access to PHI 1. Acknowledge their right to make the request and have it addressed. 2. If you are a clinician, explain to the patient the clinical risks involved. 3. If they still wish to proceed, refer them to the PACE privacy office.

If a patient asks why access to some or all of their PHI has been blocked in a clinical system promptly contact the PACE privacy office, which can get the PHI unblocked, if that is the patient s wish. The PHI may have been blocked Inadvertently through a substitute-decision maker, or at a time the patient does not recall.

If a clinical system indicates a patient s PHI is blocked or restricted read the blocking message carefully and then choose the correct response: 1. proceed without accessing the record, if you have no reason for access that is listed on the screen; or 2. choose a listed reason for access, and then proceed to the record. In this case, details of your access will be reported to the patient, in some systems.

To Protect PHI in Clinical Systems Log into the system only with your own credentials Never let others use your credentials If you are leaving, log out or lock your device If you must put PHI on a mobile device, use only an IT-approved encrypted device If you must leave a device in a car, lock it in the trunk Ensure unauthorized people cannot see your display screen

To Protect PHI in Clinical Systems (continued) Don t take pictures or screenshots of displays Print only if the system has a Print button, and then print only what you need If you must download PHI, download only what you need, and only to a secure location e.g., a password-protected file on a PACE file server, or an IT-approved encrypted USB key.

To Protect PHI when Using Email Only send email from a PACE email address, or from an address on the secure ehealth Ontario network (e.g., a hospital address, or a ONE ID address) and Ensure all recipients have a PACE address or an address on the secure ehealth Ontario network. Before pressing Send, double-check recipient addresses. When you receive an email, unless you are sure it is from a trustworthy source, never click on a link or attachment, or respond with confidential information such your password.

Shared Systems are clinical systems combining PHI from multiple healthcare organizations. They may offer potential access to millions of records. Examples include ConnectingOntario, and hospital systems to which PACE users have been granted access When accessing a shared system as a PACE user, you are acting as PACE s Agent and are therefore accountable to PACE for your actions in using the system. All clinical-systems rules for protecting privacy apply as well to shared systems. But for shared systems, there is an ADDITIONAL rule.

The ADDITIONAL Rule, for Shared Systems: You may ONLY access shared systems to provide care for, or assist in providing care for, your patients. That is, shared systems are only available for clinical care and must not be used for any other purpose such as education, research, quality improvement or risk management. Use of shared systems is vigorously audited by external parties. For example, ehealth Ontario audits how often users access particular patients, in order to catch people using ConnectingOntario for research.

In Summary You are responsible for protecting the PHI you access through clinical systems, including shared systems. You may ONLY access shared systems to provide care for, or assist in providing care for, your patients.