HIPPA Training - Handout - Centric
HIPPA Training - Handout - Centric
1 2
3 4
6
5
Privacy Rule
Security Rule
• Privacy Rule went into effect April 14, 2003.
• Security (IT) regulations went into effect April 21,
• Privacy refers to protection of an individual’s health care
data. 2005.
• Defines how patient information used and disclosed. • Security means controlling:
• Gives patients privacy rights and more control over their • Confidentiality of electronic protected health
own health information. information (ePHI).
• Outlines ways to safeguard Protected Health Information • Storage of electronic protected health information
(PHI). (ePHI)
• Access into electronic information
7 8
9 10
HIPAA Regulations
HIPAA Regulations require we protect our patients’ PHI in all media including, but not
limited to, PHI created, stored, or transmitted in/on the following media:
Section II
• Verbal Discussions (i.e. in person or on the phone)
• Written on paper (i.e. chart, progress notes, encounter forms, prescriptions, x-ray Why is HIPAA Important?
orders, referral forms and explanation of benefit (EOBs) forms
• Computer Applications and Systems (i.e. electronic health record (EHR),
Practice Management, Lab and X-Ray
• Computer Hardware/Equipment (i.e. PCs, laptops, PDAs, pagers, fax machines,
servers and cell phones
This training session provides you with REMINDERS of our organizational POLICIES and
how YOU are required to PROTECT PHI.
11 12
Why is Privacy and Security Training Important? Why is Privacy and Security Training
Important?
•Outlines ways to prevent accidental and intentional
misuse of PHI. •It is everyone’s responsibility to take the confidentiality of patient
•Makes PHI secure with minimal impact to staff and information seriously.
business processes. •Anytime you come in contact with patient information or any PHI
•It’s not just about HIPAA – it’s about doing the right that is written, spoken or electronically stored, YOU become
thing! involved with some facet of the privacy and security regulations.
•Shows our commitment to managing electronic protected •The law requires us to train you.
health information (ePHI) with the same care and respect •To ensure your understanding of the Privacy and Security Rules as
as we expect of our own private information they relate to your job.
13
14
HIPAA Definitions
What is Protected Health Information (PHI)?
15 16
• Uses ▶ Disclosures:
• Information in the health record, such as: • When we review or ◦ When we release or
• Encounter/visit documentation use PHI internally
• Lab results provide PHI to
Lab (i.e. audits, training,
• Appointment dates/times
customer service, or someone (i.e.
• Invoices
quality attorney, patient or
• Radiology films and reports faxing records to
improvement).
• History and physicals (H&Ps) Physica another provider).
X-Ray
• Patient Identifiers l
17 18
HIPAA Definitions HIPAA Definitions
What is Minimum Necessary? What is Treatment, Payment and Health Care Operations (TPO)?
• To use or disclose/release only the minimum necessary to accomplish • HIPAA allows Use and/or Disclosure of PHI for purpose of:
intended purposes of the use, disclosure, or request.
• Requests from employees at [Organization]:- • Treatment – providing care to patients.
• Identify each workforce member who needs to access PHI. • Payment – the provision of benefits and premium payment.
• Limit the PHI provided on a “need-to-know” basis.
• Requests from individuals not employed at Centric Healthcare:- • Health Care Operations – normal business activities (i.e.
• Limit the PHI provided to what is needed to accomplish the purpose for reporting, quality improvement, training, auditing, customer
which the request was made.
service and resolution of grievances data collection and
eligibility checks and accreditation).
19 20
If patients feel their PHI will be kept confidential, they will be more likely to share information needed for care.
[p
21 22
You
Organization HIPAA
Office for Civil Rights
Government Enforcement
Public
23
24
Section V HIPAA Regulations
What Are the Patient’s Rights Under HIPAA?
Patient Rights
25 26
27 28
29 30
Patient Rights Patient Rights
Accounting of Disclosures (cont’d) Accounting of Disclosures (cont’d)
Accounting of Disclosures Does Not Include Disclosures For: Accounting of Disclosures Does Include Disclosures For:
• Treatment (to persons involved in the individual’s care), payment
or health care operations.
• Individual subject of PHI. • Required by law • Organ/eye/tissue donations
• Incident to an otherwise permitted disclosure. • For public health activities • Research purposes
• Disclosure based on individual’s signed authorization. • Victims of abuse, neglect, • To avert threat to health and
• For facility directory. violence safety
• For national security or intelligence purposes. • Health oversight activities • For specialized government
• To correctional facilities or law enforcement on behalf of • Judicial/Administrative functions
inmates. proceedings • About decedents
• As part of a limited data set (see 45 CFR s. 164.514). • Workers’ compensation
• Law enforcement purposes
• Releases made in error to an
incorrect person/entity (i.e.
breach)
31 32
Personnel Designation
Privacy Officer
Section VI • Privacy Officer Responsibilities
• Development and implementation of the policies and
HIPAA Privacy Requirements procedures of the entity.
• Designated to receive and address complaints regarding
Privacy.
• Provide additional information as requested about
matters covered by the Notice of Privacy Practices.
• Designation of the Privacy Officer must be
documented.
33 34
Safeguards
Training
• Implementation of administrative, physical and
• Members of the workforce who handle PHI
require training technical safeguards (work in tandem with
• Required upon hire and recommended annually. Security rule).
• As material changes are implemented, training to • Safeguard PHI from any intentional or
appropriate workforce members affected by that unintentional use or disclosure.
change. • Limit incidental uses and disclosures that occur
• Documentation of the training, who attended, the
as a result of otherwise permitted or required
topic covered and date the training was held.
uses and disclosures.
• Example: create safeguards to prevent others from
overhearing PHI.
35 36
Patient Right Policies and Procedures
File Privacy Complaint
• Centric Healthcare must implement policies and procedures
•Individuals may file complaints with Centric designed to comply with the Breach and Privacy Rules.
Healthcare’s Privacy Official regarding health • Centric Healthcare must change policies and procedures as
necessary and appropriate to comply with changes in the law and
information privacy violations or its privacy maintain consistency between policies, procedures and the Notice of
compliance program. Privacy Practices.
• Centric Healthcare must document all changes made to policies and
•Individuals may file complaints with the procedures and maintain all policies for 6 years.
Department of Health and Human Services • Centric Healthcare must train employees on changes made to
Office of Civil Rights. policies and procedures.
37 38
Documentation
Definition of PHI Misuse
• CentricHealthcare must maintain all documentation
for 6 years from the date of its creation, including: ▶ The following activities occurring in the absence of patient
• Policiesand procedures in written or electronic form; authorization are considered misuse of protected health information
(PHI):
• Communications in written or electronic form when such
◦ Access
communications are required in writing; ◦ Using
• Written or electronic records of actions, activities, or ◦ Taking
designations as required. No! You must have
authorization first! ◦ Possession
◦ Release
◦ Editing
◦ Destruction
Corrective
Event Investigation Resolution Documentation
Action
39 40
42
41
Release of Information
Permitted Uses and Disclosures of PHI Without
Authorization
• Uses and disclosures of PHI for (TPO):
• Treatment
Section VII • Payment
• Health Care Operations
Release of Information • Disclosures required or permitted by law.
• If use of the information does not fall under one of these
categories you must have the patient’s signed
authorization (written permission) before sharing that
information with anyone.
44
43
45 46
Release of Information
Release of Information Minimum Necessary
Restrictions and Alerts •HIPAA requires reasonable steps to limit the use and disclosures
of, and requests for, protected health information to the
•Your organization may have restrictions or alerts designed to minimum necessary to accomplish the intended purpose.
bring an employee’s attention to specific information
•For example: •The standard does not apply to the following:
• Patient is adopted. Check Centric Healthcare Personnel Policies for • Disclosures to or requests by a health care provider for treatment purposes
special instructions • Disclosures to the individual subject of the information
• Patient has authorized spouse to receive lab results on her behalf. • Uses or disclosures made pursuant to the individual’s authorization
Check Centric Healthcare Personnel Policies for more information • Use or disclosures required for compliance with Health Insurance HIPAA
administrative Simplification Rules
• Disclosures to the Dept. of Health and Human Services (HHS) when
disclosure is required under the Privacy Rule for enforcement purposes
• Uses or disclosures that are required by other laws
48
Release of Information Release of Information
To Another Facility Faxing PHI
• Can I release a patient’s address and/or insurance information • May PHI Be Transmitted via Fax Machine?
to a nursing home? • Yes, but only when in best interest of patient care or payment of
• Yes, if you know the requesting individual and the claims.
request is legitimate. • Faxing sensitive PHI, such as HIV, mental health, AODA, and
• If you are unfamiliar with the individual requesting the STD’s is strongly discouraged.
information, ask for the following in writing: • It is best practice to test a fax number prior to transmitting
• Patient’s name, date of birth, and address information. If this is not possible:
• Why the information is needed • Restate the fax number to the individual providing it.
• Specific reason (e.g. treatment or payment) • Obtain telephone number to contact the recipient with any
• The requestor’s name, name of the nursing home, and a direct telephone questions.
to the nursing home (switchboard) • Do not include PHI on the cover sheet.
• If uncertain, obtain patient authorization • Verify you are including only correct patient’s information (i.e.
check the top and bottom pages).
• Double check the fax number prior to transmission
49 50
Release of Information
Release of Information E-Mail (cont’d)
E-Mail • We may communicate with patients through e-mail only if
the patient has signed the agency’s privacy and security
• We may not communicate with patients through e-mail at this time.
E-Mail Agreement.
• The patient portal will provide the opportunity to electronically
communicate with our patients. • When sending ePHI to anyone for treatment, payment or
• When sending ePHI to other organizations for required business functions healthcare operations, encrypt the e-mail per Centric
(i.e. treatment, payment or healthcare operations), encrypt the email per Healthcare procedures, and verify the organization’s
agency’s procedures. confidentiality disclaimer is included.
Note to Organization: Depending on your Email policy, include either this slide, or the previous, but not both
Note to Organization: Depending on your Email policy, include either this slide, or the next, but not both
51 52
53 54
How We Apply the Security Rule How We Apply the Security Rule
Policies and Procedures
Administrative Safeguards
Policies and procedures are REQUIRED and must be followed by
employees to maintain security (i.e. disaster, internet and e-mail use) • Internet Use
• Access only trusted, approved sites
Technical Safeguards
• Don’t download programs to your workstation
Technical devices needed to maintain security.
• Assignment of different levels of access
• Screen savers
• Devices to scan ID badges
• E-Mail
• Audit trails • Keep e-mail content professional
Physical Safeguards
• Use work e-mail for work purposes only
Must have physical barriers and devices: • Don’t open e-mails or attachments if you are suspicious of or
◦ Lock doors don’t know the sender
◦ Monitor visitors
• Don’t forward jokes
◦ Secure unattended computers
• Follow [Organization’s] policy for sending secure E-mails
55 56
Access to ePHI
How We Apply the Security Rule Passwords
ePHI Access
• The Security Rule requires the agency to implement
• How Do We Control ePHI Access? procedures regarding access controls, which can
include the creation and use of passwords, to verify
✔ User names and passwords that a person or entity seeking access to ePHI is the
✔ Biometrics one claimed.
✔ Screen savers • The use of a strong password to protect access to
✔ Automatic logoff ePHI is an appropriate and expected risk
management strategy.
57 58
59 60
Safeguarding PHI
Confidentiality
61 62
63 64
Safeguarding PHI
Transporting PHI Offsite
• When necessary to transport PHI externally:
• Place in a locked briefcase, closed container, sealed, self-addressed
interoffice envelope; Section X
• Place PHI in the trunk of your vehicle, if available, or on the floor HIPAA Violations and Complaints
behind the front seat;
• Lock vehicles when PHI is left unattended
• [Include if this applies to your organization]: You may not transport patient
charts between departments or offsite unless authorized by the Director of
Health Information Management.
65 66
HIPAA and Your Role HIPAA Violations
• Remember, it is your responsibility, as a Centric • Three types of violations:
Healthcare’s employee or independent contractor, to •Incidental
comply with all privacy and security laws, regulations, •Accidental
and all agency’s policies pertaining to them.
•Intentional
• Employees and independent contractors suspected of
violating a privacy or security law, regulation, or
agency’s policy are provided reasonable opportunity to
explain their actions.
• Violations of any law, regulation, and/or agency’s policy
will result in disciplinary action, up to and including
termination, according to agency’s HR Policy.
How much is enough? How much is too much?
67 68
How Do I Report
HIPAA Privacy Violations?
Patient Complaints
• Directly to your Supervisor, who in turn reports it to the
Agency’s Privacy Officer.
We Must Respond to Privacy and Security Complaints
• Call or email the Privacy Officer.
All Privacy Complaints Must Be Reported
69 70
71
72