SlideShare une entreprise Scribd logo
1  sur  4
HIPAA 2010                                                                                                    2/17/12 2:57 PM



                                                                        Search   Upload              Go PRO       Login or Signup




    Email    Favorite   Download     Embed           Like   Tweet   0      0       Share   Related

                                                                                                          HIPAA Basics




                                                                                                          HIPAA Aware
                                                                                                          ness Training




                                                                                                          HIPAA Compl
                                                                                                          iance




                                                                                                          Nursing Stu
                                                                                                          dents
                                                                                                          October 2009




                                                                                                          Hipaa




                                                                                                          2010 interp
                                                                                                          reter HIPAA
                                                                                                          training
                                                                                       !

                                                                                                          HIPAA and R
                                                                                                          HIOs




                                                                                                          HIPAA




http://www.slideshare.net/barbarabenson/hipaa-2010                                                                   Page 1 of 4
HIPAA 2010                                                                                                                   2/17/12 2:57 PM


             HIPAA 2010                                                                                             382
             by barbarabenson on Jun 14, 2010                                                                        views


+ Follow

                                                                                                                  More…



   No comments yet            Notes on Slide 1


                   Write a comment...




                    Post Comment           Subscribe to comments




HIPAA 2010 — Presentation Transcript

1. HIPAA Health Insurance Portability and Accountability Act Barbara Benson, R.T.

2. History of Medical Ethics Hippocrates    460 BC Practice medicine for the benefit of patients Primum non
nocere First, do no harm Abstain from mischief and corruption Maintain doctor-patient confidentiality

3. History of Medical Ethics Thomas Percival    1803 Published the first code of medical ethics Later adopted
by the AMA in 1847 Moral authority and independence of physicians, responsibility to care for the sick, and
individual honor

4. Declaration of Geneva    1948 Meant to update the Hippocratic Oath Health and conscience Voluntary
consent Access without discrimination History of Medical Ethics

5. Commonalities Honesty Integrity Confidentiality

6. HIPAA -Kennedy-Kassenbaum Bill Health Information Portability and Accountability Act Protects the
privacy and security of patient information Sets limits on who can look at and receive health information Final
rule issued 8 -14 -02 requiring compliance by 8 -14 -03

7. HIPAA Enforcement Civil Penalties Up to $100 per violation per individual Criminal Penalties “ Egregious
violations”… the sale of information, gaining access under false pretenses, or releasing information with
harmful intent included Up to $250,000 fine and possible incarceration

8. What is Protected? Protected Health Information        PHI Individually identifiable health information
Information that can be linked to a particular person originating from a health care service event A physical
or mental health condition at any time

9. HIPAA Identifiers Geographic subdivisions smaller than a State Dates (except year) directly related to
patient Telephone numbers, Fax numbers, E-mail addresses, SS numbers Medical record numbers , Health
plan beneficiary numbers Account numbers , Certificate/license numbers , Vehicle identifiers Device identifiers
and serial numbers, Web URLs , IP address numbers Biometric identifiers, including finger and voice prints
Full face photos Any other unique identifying number, characteristic, or code, except as permitted under
HIPAA to re-identify data


10. PHI Communication Methods HIPAA governs where and how PHI is communicated between all TPO’s
Electronic communication     Written communication including the medical record         Verbal communication
between healthcare workers or between healthcare workers and the patient

11. Privacy of Communication Access, Use or Disclosure of all Protected Health Information is based on : •
Need to Know and • Minimum Necessary

12. Who Must Protect it? Covered Entities • A Health Plan or a Healthcare Provider who transmits any health




http://www.slideshare.net/barbarabenson/hipaa-2010                                                                                Page 2 of 4
HIPAA 2010                                                                                                       2/17/12 2:57 PM


information in electronic form in connection with a transaction • Business Associates with whom they share
PHI

13. “ Need to Know” Individually identifiable information should be made available only to persons whose job
requires access to that information.

14. “ Minimum Necessary” • Only information that is the minimum necessary to get the job done no matter
how much access is provided or available • Having access to patient information does not give the right to
access or disclose regardless of intent

15. “ Minimum Necessary” Before looking at information, ask yourself “ Do I need to know this to do my
job? ” Before sharing information, ask yourself “ Do they need to know this information to do their job? ”

16. “ Minimum Necessary” Clinicians may look at and share with other clinicians the entire medical record of
patients they are treating

17. Patient Rights

18. Notice of Privacy Practices    NPP Governs the uses of PHI as permissible by the patient within
Treatment, Payment and Healthcare Operations (TPO’s) Once the patient is given a NPP at the first treatment
encounter, PHI can be used for any TPO purpose NPP is a once in a lifetime requirement

19. NPP Requirements Post NPP prominently The patient signs a separate acknowledgement document that
contains the privacy officer contact information for that facility Copies of NPP and acknowledgement sheet to
patent

20. Patient Rights NPP Includes the patient's right to: Restrict Access Amend Accounting Alternative
Communication Methods Complain

21. Patient Rights Minors (under 18) have a right to confidential treatment with respect to the following
without a parents consent or notice: Abortion Birth control STD testing HIV/AIDS testing Mental health
counseling

22. Permitted by Law Outside of TPO or patient authorization, the only other permitted use of PHI are those
required by law: Investigations by HHS Reporting about victims of abuse, neglect or domestic violence
Adverse Event Reporting Reporting to Public Health Authorities

23. HIPAA Authorization Patient Authorization Elements The information Who may use or disclose the
information Who may receive the information Purpose of the use or disclosure Expiration date or event
Individual’s signature and date Right to revoke authorization Right to refuse to sign authorization
Redisclosure statement

24. Record Keeping Good record keeping is a must Authorizations for use of PHI should be kept for at least
six years Additionally, a record of what information was sent, and to whom.

25. Privacy Protection

26. Acceptable to use the patient’s full name on sign in sheets but not the reason for the visit Acceptable to
page a patient using their full name Ask companions to honor the patient’s privacy by waiting in another
room Privacy Protection

27. Privacy Protection Do not leave medical information on answering machines Do not leave the medical
record unattended Dispose of patient information properly

28. Computer Privacy Protection Use 7 character alpha numeric passwords Do not share passwords Secure
written passwords Log off Use screen savers Keep monitor facing away from onlookers Avoid sending the
patient information using e-mail


29. Practical Privacy Tips Be aware of your surroundings and who’s listening Close doors whenever possible
Speak as softly as possible Knock before entering Secure the privacy of all medical records before walking
away


30. HIPAA and Research An authorization must be signed by patients for all clinical research HIPAA
Disclosure Universe Authorization signed by patient for all clinical research Waiver Criteria applied before
records research Exceptions Documented De-identified Limited Dataset TPO Public Safety and other
exceptions




http://www.slideshare.net/barbarabenson/hipaa-2010                                                                    Page 3 of 4
HIPAA 2010                                                                                                                                           2/17/12 2:57 PM


31. Research Authorization Who can use or disclose PHI To whom PHI may be disclosed What PHI may be
used or disclosed The purposes of the used or disclosed PHI The duration of the authorization (expiration
date or event)




                                                                    LEARN ABOUT US                  USING SLIDESHARE       PRO & MORE           DEVELOPERS & API
                                                Search
                                                                    About                           SlideShare 101         Go PRO new           Developers Section
                                                                    Careers                         Terms of Use           Business Solutions   Developers Group
        SlideShare                    Follow us on                  Our Blog                        Privacy Policy         Advertise on         Engineering Blog
        on mobile                     Twitter                                                                              SlideShare
                                                                    Press                           Copyright & DMCA                            Blog Widgets
                                                                    Contact us                      Community Guidelines
        Find us on                    Connect on
                                                                    Help & Support
        Facebook                      LinkedIn


© 2012 SlideShare Inc. All rights reserved.




http://www.slideshare.net/barbarabenson/hipaa-2010                                                                                                             Page 4 of 4

Contenu connexe

Similaire à “Hipaa 2010”

663 project 1 facilitation powerpoint(20 minutes) (2)
663 project 1 facilitation powerpoint(20 minutes) (2)663 project 1 facilitation powerpoint(20 minutes) (2)
663 project 1 facilitation powerpoint(20 minutes) (2)wjclou01
 
Protected health information
Protected health informationProtected health information
Protected health informationmiszkeeta
 
How to Build HIPAA Compliant Healthcare Apps: Everything You Should Know!
How to Build HIPAA Compliant Healthcare Apps: Everything You Should Know!How to Build HIPAA Compliant Healthcare Apps: Everything You Should Know!
How to Build HIPAA Compliant Healthcare Apps: Everything You Should Know!default default
 
Health Insurance Portability & Accountability Act (HIPAA).pptx
Health Insurance Portability & Accountability Act (HIPAA).pptxHealth Insurance Portability & Accountability Act (HIPAA).pptx
Health Insurance Portability & Accountability Act (HIPAA).pptxHariomjaiswal14
 
HIPAA Training (2017)
HIPAA Training (2017) HIPAA Training (2017)
HIPAA Training (2017) Arete-Zoe, LLC
 
The purpose of HIPAA is to protect patient rights and privacy. Many .docx
The purpose of HIPAA is to protect patient rights and privacy. Many .docxThe purpose of HIPAA is to protect patient rights and privacy. Many .docx
The purpose of HIPAA is to protect patient rights and privacy. Many .docxoscars29
 
Hipaa training
Hipaa trainingHipaa training
Hipaa trainingjjgreen001
 
Understanding patient privacy 1
Understanding patient privacy 1Understanding patient privacy 1
Understanding patient privacy 1Jonsie12
 
Hipaa training
Hipaa trainingHipaa training
Hipaa trainingTara Dye
 
HIPPA---Chantel Artis Spencer
HIPPA---Chantel Artis SpencerHIPPA---Chantel Artis Spencer
HIPPA---Chantel Artis Spencershay1234
 
Personal Health Records & HIPAA
Personal Health Records & HIPAAPersonal Health Records & HIPAA
Personal Health Records & HIPAAMargery Lynn
 

Similaire à “Hipaa 2010” (20)

663 project 1 facilitation powerpoint(20 minutes) (2)
663 project 1 facilitation powerpoint(20 minutes) (2)663 project 1 facilitation powerpoint(20 minutes) (2)
663 project 1 facilitation powerpoint(20 minutes) (2)
 
Hipaa
HipaaHipaa
Hipaa
 
Protected health information
Protected health informationProtected health information
Protected health information
 
How to Build HIPAA Compliant Healthcare Apps: Everything You Should Know!
How to Build HIPAA Compliant Healthcare Apps: Everything You Should Know!How to Build HIPAA Compliant Healthcare Apps: Everything You Should Know!
How to Build HIPAA Compliant Healthcare Apps: Everything You Should Know!
 
Dustin HIPAA
Dustin HIPAADustin HIPAA
Dustin HIPAA
 
Understanding HIPAA and Ensuring Patient Privacy
Understanding HIPAA and Ensuring Patient PrivacyUnderstanding HIPAA and Ensuring Patient Privacy
Understanding HIPAA and Ensuring Patient Privacy
 
Hippa
HippaHippa
Hippa
 
Health Insurance Portability & Accountability Act (HIPAA).pptx
Health Insurance Portability & Accountability Act (HIPAA).pptxHealth Insurance Portability & Accountability Act (HIPAA).pptx
Health Insurance Portability & Accountability Act (HIPAA).pptx
 
HIPAA Training (2017)
HIPAA Training (2017) HIPAA Training (2017)
HIPAA Training (2017)
 
The purpose of HIPAA is to protect patient rights and privacy. Many .docx
The purpose of HIPAA is to protect patient rights and privacy. Many .docxThe purpose of HIPAA is to protect patient rights and privacy. Many .docx
The purpose of HIPAA is to protect patient rights and privacy. Many .docx
 
HIPAA
HIPAAHIPAA
HIPAA
 
HIPAA
HIPAAHIPAA
HIPAA
 
Hipaa privacy rule
Hipaa privacy ruleHipaa privacy rule
Hipaa privacy rule
 
Hipaa
HipaaHipaa
Hipaa
 
Hipaa training
Hipaa trainingHipaa training
Hipaa training
 
Understanding patient privacy 1
Understanding patient privacy 1Understanding patient privacy 1
Understanding patient privacy 1
 
Hipaa training
Hipaa trainingHipaa training
Hipaa training
 
Confidentiality-Arlicia- mha 690-discussion 2
Confidentiality-Arlicia- mha 690-discussion 2 Confidentiality-Arlicia- mha 690-discussion 2
Confidentiality-Arlicia- mha 690-discussion 2
 
HIPPA---Chantel Artis Spencer
HIPPA---Chantel Artis SpencerHIPPA---Chantel Artis Spencer
HIPPA---Chantel Artis Spencer
 
Personal Health Records & HIPAA
Personal Health Records & HIPAAPersonal Health Records & HIPAA
Personal Health Records & HIPAA
 

Dernier

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 

Dernier (20)

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 

“Hipaa 2010”

  • 1. HIPAA 2010 2/17/12 2:57 PM Search Upload Go PRO Login or Signup Email Favorite Download Embed Like Tweet 0 0 Share Related HIPAA Basics HIPAA Aware ness Training HIPAA Compl iance Nursing Stu dents October 2009 Hipaa 2010 interp reter HIPAA training ! HIPAA and R HIOs HIPAA http://www.slideshare.net/barbarabenson/hipaa-2010 Page 1 of 4
  • 2. HIPAA 2010 2/17/12 2:57 PM HIPAA 2010 382 by barbarabenson on Jun 14, 2010 views + Follow More… No comments yet Notes on Slide 1 Write a comment... Post Comment Subscribe to comments HIPAA 2010 — Presentation Transcript 1. HIPAA Health Insurance Portability and Accountability Act Barbara Benson, R.T. 2. History of Medical Ethics Hippocrates 460 BC Practice medicine for the benefit of patients Primum non nocere First, do no harm Abstain from mischief and corruption Maintain doctor-patient confidentiality 3. History of Medical Ethics Thomas Percival 1803 Published the first code of medical ethics Later adopted by the AMA in 1847 Moral authority and independence of physicians, responsibility to care for the sick, and individual honor 4. Declaration of Geneva 1948 Meant to update the Hippocratic Oath Health and conscience Voluntary consent Access without discrimination History of Medical Ethics 5. Commonalities Honesty Integrity Confidentiality 6. HIPAA -Kennedy-Kassenbaum Bill Health Information Portability and Accountability Act Protects the privacy and security of patient information Sets limits on who can look at and receive health information Final rule issued 8 -14 -02 requiring compliance by 8 -14 -03 7. HIPAA Enforcement Civil Penalties Up to $100 per violation per individual Criminal Penalties “ Egregious violations”… the sale of information, gaining access under false pretenses, or releasing information with harmful intent included Up to $250,000 fine and possible incarceration 8. What is Protected? Protected Health Information PHI Individually identifiable health information Information that can be linked to a particular person originating from a health care service event A physical or mental health condition at any time 9. HIPAA Identifiers Geographic subdivisions smaller than a State Dates (except year) directly related to patient Telephone numbers, Fax numbers, E-mail addresses, SS numbers Medical record numbers , Health plan beneficiary numbers Account numbers , Certificate/license numbers , Vehicle identifiers Device identifiers and serial numbers, Web URLs , IP address numbers Biometric identifiers, including finger and voice prints Full face photos Any other unique identifying number, characteristic, or code, except as permitted under HIPAA to re-identify data 10. PHI Communication Methods HIPAA governs where and how PHI is communicated between all TPO’s Electronic communication Written communication including the medical record Verbal communication between healthcare workers or between healthcare workers and the patient 11. Privacy of Communication Access, Use or Disclosure of all Protected Health Information is based on : • Need to Know and • Minimum Necessary 12. Who Must Protect it? Covered Entities • A Health Plan or a Healthcare Provider who transmits any health http://www.slideshare.net/barbarabenson/hipaa-2010 Page 2 of 4
  • 3. HIPAA 2010 2/17/12 2:57 PM information in electronic form in connection with a transaction • Business Associates with whom they share PHI 13. “ Need to Know” Individually identifiable information should be made available only to persons whose job requires access to that information. 14. “ Minimum Necessary” • Only information that is the minimum necessary to get the job done no matter how much access is provided or available • Having access to patient information does not give the right to access or disclose regardless of intent 15. “ Minimum Necessary” Before looking at information, ask yourself “ Do I need to know this to do my job? ” Before sharing information, ask yourself “ Do they need to know this information to do their job? ” 16. “ Minimum Necessary” Clinicians may look at and share with other clinicians the entire medical record of patients they are treating 17. Patient Rights 18. Notice of Privacy Practices NPP Governs the uses of PHI as permissible by the patient within Treatment, Payment and Healthcare Operations (TPO’s) Once the patient is given a NPP at the first treatment encounter, PHI can be used for any TPO purpose NPP is a once in a lifetime requirement 19. NPP Requirements Post NPP prominently The patient signs a separate acknowledgement document that contains the privacy officer contact information for that facility Copies of NPP and acknowledgement sheet to patent 20. Patient Rights NPP Includes the patient's right to: Restrict Access Amend Accounting Alternative Communication Methods Complain 21. Patient Rights Minors (under 18) have a right to confidential treatment with respect to the following without a parents consent or notice: Abortion Birth control STD testing HIV/AIDS testing Mental health counseling 22. Permitted by Law Outside of TPO or patient authorization, the only other permitted use of PHI are those required by law: Investigations by HHS Reporting about victims of abuse, neglect or domestic violence Adverse Event Reporting Reporting to Public Health Authorities 23. HIPAA Authorization Patient Authorization Elements The information Who may use or disclose the information Who may receive the information Purpose of the use or disclosure Expiration date or event Individual’s signature and date Right to revoke authorization Right to refuse to sign authorization Redisclosure statement 24. Record Keeping Good record keeping is a must Authorizations for use of PHI should be kept for at least six years Additionally, a record of what information was sent, and to whom. 25. Privacy Protection 26. Acceptable to use the patient’s full name on sign in sheets but not the reason for the visit Acceptable to page a patient using their full name Ask companions to honor the patient’s privacy by waiting in another room Privacy Protection 27. Privacy Protection Do not leave medical information on answering machines Do not leave the medical record unattended Dispose of patient information properly 28. Computer Privacy Protection Use 7 character alpha numeric passwords Do not share passwords Secure written passwords Log off Use screen savers Keep monitor facing away from onlookers Avoid sending the patient information using e-mail 29. Practical Privacy Tips Be aware of your surroundings and who’s listening Close doors whenever possible Speak as softly as possible Knock before entering Secure the privacy of all medical records before walking away 30. HIPAA and Research An authorization must be signed by patients for all clinical research HIPAA Disclosure Universe Authorization signed by patient for all clinical research Waiver Criteria applied before records research Exceptions Documented De-identified Limited Dataset TPO Public Safety and other exceptions http://www.slideshare.net/barbarabenson/hipaa-2010 Page 3 of 4
  • 4. HIPAA 2010 2/17/12 2:57 PM 31. Research Authorization Who can use or disclose PHI To whom PHI may be disclosed What PHI may be used or disclosed The purposes of the used or disclosed PHI The duration of the authorization (expiration date or event) LEARN ABOUT US USING SLIDESHARE PRO & MORE DEVELOPERS & API Search About SlideShare 101 Go PRO new Developers Section Careers Terms of Use Business Solutions Developers Group SlideShare Follow us on Our Blog Privacy Policy Advertise on Engineering Blog on mobile Twitter SlideShare Press Copyright & DMCA Blog Widgets Contact us Community Guidelines Find us on Connect on Help & Support Facebook LinkedIn © 2012 SlideShare Inc. All rights reserved. http://www.slideshare.net/barbarabenson/hipaa-2010 Page 4 of 4