SlideShare a Scribd company logo
1 of 36
HIPAA BASICS

A crash course for CCFI
employees and volunteers

Information by Rachelle Cook
Designed by Michelle Hughes
CCFI Privacy Officer
HIPAA …

What is it?
• Health Information Portability &
Accountability Act of 1996:
The Privacy Rule
• Privacy refers to the protection of an
individual’s health care data
Privacy Regulations:
• DEFINE
• GIVE
• OUTLINE
The Security Rule
• Security means controlling:
•Confidentiality
• Storage
• Access
Electronic Data Exchange
• This defines the
way we can
electronically
transfer information
Why should we care about all of
this stuff?

It’s wh
a
ourse t we would
lves
want

s
ral
mo

RE
P

UT
AT
IO

id

N

The la
w

Build trus
t wit

w

ica
cy
ed
en
lM
ag federa
f
ur
t o ding o
tec ithhol

To pr
otect
ourse
lves

o do

h clients

right
thing
t

SAFETY

Ser
ve o
ur cl
ients
b
etter

ro

p tial
To oten
id p
avo
To ds.
fun

It’s th
e
We protect PHI in all media created, stored, or
transmitted
Software

Verbal

Written

Hardware
We should treat personal electronic data
with the same care and respect as
weapons-grade plutonium. It is dangerous,
long-lasting and once it has leaked,
there's no getting it back.

- Corey Doctorow
Protected Health Information (PHI)
This includes information
about:
o Health/condition of an
individual
o Payment for health care
of an individual
Examples of PHI
nt f o
Enrollme

rms

Invoices

Appointment cards
PHI includes client identifiers …
The captain of this
ship is my client.
He is a mess …

Captain
Picard???
HIPAA Lingo
• Use
• Disclose
What does releasing the “minimum necessary” PHI mean?
I on
ly a
add sked
res for
s … her
Id
idn
oth
er ’t nee
stu
ff— d tha
yik t
es!
What is TPO?
We only want to use and/or Disclose PHI for the purpose of
Treatment, Payment, and Operations.
Who Protects HIPAA?
Privacy Complaints
Remember who our
privacy officer is?

Totes.

Report complaints to her.
Common violations
Accessing More Than the Minimum
Necessary
Hey girl,
I found the record,
and went ahead
and read the other
records too — they
were so interesting.
Technology Problems
Misuse of PHI

It sucks when
you use my
PHI without
authorization
…
How do these mistakes happen?
Human Error
Wrong Records Released
You gave my
insurance co.
too much
info!
Wrong Address
You ordered a
cat, right?

No …
Oh, sorry.
Wrong address
Leaving Messages
What you can do to protect information
When you see someone you know …
This is
awkward …
Delivering and Transporting PHI
Keeping Paper Safe
Types of Violations
Incidental
Intentional

Accidental
Report violations … because you should
You know you are
supposed to
report that to our
privacy officer,
right?
Disposal of PHI
It’s your job!

More Related Content

What's hot

Welcome to the hippa, privacy and security
Welcome to the hippa, privacy and securityWelcome to the hippa, privacy and security
Welcome to the hippa, privacy and securityveve1728
 
HIPPA Compliance
HIPPA ComplianceHIPPA Compliance
HIPPA Compliancedixibee
 
Hippa training on confidentiality
Hippa training on confidentialityHippa training on confidentiality
Hippa training on confidentialitycraig45365
 
Hippa slide show
Hippa slide showHippa slide show
Hippa slide showheathercool
 
HIPAA - Understanding the Basics of Compliance
HIPAA - Understanding the Basics of ComplianceHIPAA - Understanding the Basics of Compliance
HIPAA - Understanding the Basics of ComplianceJay Hodes
 
Health Insurance Portability and Accountability Act (HIPPA) - Kloudlearn
Health Insurance Portability and Accountability Act (HIPPA) - KloudlearnHealth Insurance Portability and Accountability Act (HIPPA) - Kloudlearn
Health Insurance Portability and Accountability Act (HIPPA) - KloudlearnKloudLearn
 
HIPPA Security Presentation
HIPPA Security PresentationHIPPA Security Presentation
HIPPA Security PresentationRebecca Norman
 
Week 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy trainingWeek 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy trainingvrgill22
 
Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)bholmes
 
Application Developers Guide to HIPAA Compliance
Application Developers Guide to HIPAA ComplianceApplication Developers Guide to HIPAA Compliance
Application Developers Guide to HIPAA ComplianceTrueVault
 

What's hot (20)

Hippa
HippaHippa
Hippa
 
Welcome to the hippa, privacy and security
Welcome to the hippa, privacy and securityWelcome to the hippa, privacy and security
Welcome to the hippa, privacy and security
 
HIPAA Complaince
HIPAA ComplainceHIPAA Complaince
HIPAA Complaince
 
HIPPA Compliance
HIPPA ComplianceHIPPA Compliance
HIPPA Compliance
 
Hippa training on confidentiality
Hippa training on confidentialityHippa training on confidentiality
Hippa training on confidentiality
 
Hippa slide show
Hippa slide showHippa slide show
Hippa slide show
 
HIPAA - Understanding the Basics of Compliance
HIPAA - Understanding the Basics of ComplianceHIPAA - Understanding the Basics of Compliance
HIPAA - Understanding the Basics of Compliance
 
Annual HIPAA Training
Annual HIPAA TrainingAnnual HIPAA Training
Annual HIPAA Training
 
The Basics of HIPAA
The Basics of HIPAA The Basics of HIPAA
The Basics of HIPAA
 
HIPAA HITECH training 7-9-12
HIPAA HITECH training 7-9-12HIPAA HITECH training 7-9-12
HIPAA HITECH training 7-9-12
 
HIPAA Compliance
HIPAA ComplianceHIPAA Compliance
HIPAA Compliance
 
UNA HIPAA Training 8-13
UNA HIPAA Training   8-13UNA HIPAA Training   8-13
UNA HIPAA Training 8-13
 
Health Insurance Portability and Accountability Act (HIPPA) - Kloudlearn
Health Insurance Portability and Accountability Act (HIPPA) - KloudlearnHealth Insurance Portability and Accountability Act (HIPPA) - Kloudlearn
Health Insurance Portability and Accountability Act (HIPPA) - Kloudlearn
 
Hipaa
HipaaHipaa
Hipaa
 
HIPPA Security Presentation
HIPPA Security PresentationHIPPA Security Presentation
HIPPA Security Presentation
 
Week 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy trainingWeek 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy training
 
HIPAA
HIPAAHIPAA
HIPAA
 
Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)
 
Application Developers Guide to HIPAA Compliance
Application Developers Guide to HIPAA ComplianceApplication Developers Guide to HIPAA Compliance
Application Developers Guide to HIPAA Compliance
 
HIPAA Audio Presentation
HIPAA  Audio PresentationHIPAA  Audio Presentation
HIPAA Audio Presentation
 

Viewers also liked

HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA BasicsKarna *
 
Final gygax training module_ attempt 2
Final gygax training module_ attempt 2Final gygax training module_ attempt 2
Final gygax training module_ attempt 2Elspeth Gygax
 
Personal Health Records & HIPAA
Personal Health Records & HIPAAPersonal Health Records & HIPAA
Personal Health Records & HIPAAMargery Lynn
 
The importance of hipaa compliance and training
The importance of hipaa compliance and trainingThe importance of hipaa compliance and training
The importance of hipaa compliance and trainingLaDavia Day, MHA, BS
 
HIPAA Training - 2011
HIPAA Training - 2011HIPAA Training - 2011
HIPAA Training - 2011darichardson
 

Viewers also liked (6)

HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA Basics
 
HIPAA
HIPAAHIPAA
HIPAA
 
Final gygax training module_ attempt 2
Final gygax training module_ attempt 2Final gygax training module_ attempt 2
Final gygax training module_ attempt 2
 
Personal Health Records & HIPAA
Personal Health Records & HIPAAPersonal Health Records & HIPAA
Personal Health Records & HIPAA
 
The importance of hipaa compliance and training
The importance of hipaa compliance and trainingThe importance of hipaa compliance and training
The importance of hipaa compliance and training
 
HIPAA Training - 2011
HIPAA Training - 2011HIPAA Training - 2011
HIPAA Training - 2011
 

Similar to Hipaa basics

Mha 690 week 1 discussion presentation
Mha 690 week 1 discussion presentationMha 690 week 1 discussion presentation
Mha 690 week 1 discussion presentationfalane
 
Hipaa education
Hipaa educationHipaa education
Hipaa educationeklundc
 
Hipaa overview 073118
Hipaa overview 073118Hipaa overview 073118
Hipaa overview 073118robint2125
 
Medical Data Encryption 101
Medical Data Encryption 101Medical Data Encryption 101
Medical Data Encryption 101SecurityMetrics
 
Employee monitoring updated
Employee monitoring updatedEmployee monitoring updated
Employee monitoring updatedAdvent IM Ltd
 
HIPAA presentation GAHU v7
HIPAA presentation GAHU v7HIPAA presentation GAHU v7
HIPAA presentation GAHU v7Jason Karn
 
Hcc_hipaa hitech training_Basic www.hcctecnologies.com
Hcc_hipaa hitech training_Basic www.hcctecnologies.comHcc_hipaa hitech training_Basic www.hcctecnologies.com
Hcc_hipaa hitech training_Basic www.hcctecnologies.comejazmazhar
 
HIPAA Compliance Email
HIPAA Compliance EmailHIPAA Compliance Email
HIPAA Compliance EmailL Andersen
 
Training on confidentiality MHA690 Hayden
Training on confidentiality MHA690 HaydenTraining on confidentiality MHA690 Hayden
Training on confidentiality MHA690 Haydenhaydens
 
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018Next Dimension Inc.
 
Are You HIPAA Safe?
Are You HIPAA Safe?Are You HIPAA Safe?
Are You HIPAA Safe?TriageLogic
 
Skills to Foster data protection power point 2015
Skills to Foster data protection power point 2015Skills to Foster data protection power point 2015
Skills to Foster data protection power point 2015Martin Lawrence
 
eMetrics Summit Boston 2014 - Big Data Marketing - From Über Creepy to Over ...
 eMetrics Summit Boston 2014 - Big Data Marketing - From Über Creepy to Over ... eMetrics Summit Boston 2014 - Big Data Marketing - From Über Creepy to Over ...
eMetrics Summit Boston 2014 - Big Data Marketing - From Über Creepy to Over ...Aurélie Pols
 
HIPAA Compliance For Small Practices
HIPAA Compliance For Small PracticesHIPAA Compliance For Small Practices
HIPAA Compliance For Small PracticesNisos Health
 
1 Explain the principle of privacy. What impact has IT made on priv.pdf
1 Explain the principle of privacy. What impact has IT made on priv.pdf1 Explain the principle of privacy. What impact has IT made on priv.pdf
1 Explain the principle of privacy. What impact has IT made on priv.pdfAroraRajinder1
 
Freedom of Information, What do We Know?
Freedom of Information, What do We Know?Freedom of Information, What do We Know?
Freedom of Information, What do We Know?Kieran Lamb
 

Similar to Hipaa basics (20)

Mha 690 week 1 discussion presentation
Mha 690 week 1 discussion presentationMha 690 week 1 discussion presentation
Mha 690 week 1 discussion presentation
 
Hipaa education
Hipaa educationHipaa education
Hipaa education
 
Hipaa overview 073118
Hipaa overview 073118Hipaa overview 073118
Hipaa overview 073118
 
Medical Data Encryption 101
Medical Data Encryption 101Medical Data Encryption 101
Medical Data Encryption 101
 
Employee monitoring updated
Employee monitoring updatedEmployee monitoring updated
Employee monitoring updated
 
HIPAA presentation GAHU v7
HIPAA presentation GAHU v7HIPAA presentation GAHU v7
HIPAA presentation GAHU v7
 
Hipaa
HipaaHipaa
Hipaa
 
Hcc_hipaa hitech training_Basic www.hcctecnologies.com
Hcc_hipaa hitech training_Basic www.hcctecnologies.comHcc_hipaa hitech training_Basic www.hcctecnologies.com
Hcc_hipaa hitech training_Basic www.hcctecnologies.com
 
Frankston
FrankstonFrankston
Frankston
 
HIPAA Compliance Email
HIPAA Compliance EmailHIPAA Compliance Email
HIPAA Compliance Email
 
Audit Reality Webinar
Audit Reality WebinarAudit Reality Webinar
Audit Reality Webinar
 
Training on confidentiality MHA690 Hayden
Training on confidentiality MHA690 HaydenTraining on confidentiality MHA690 Hayden
Training on confidentiality MHA690 Hayden
 
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
 
Are You HIPAA Safe?
Are You HIPAA Safe?Are You HIPAA Safe?
Are You HIPAA Safe?
 
Hipaa pesentation
Hipaa pesentationHipaa pesentation
Hipaa pesentation
 
Skills to Foster data protection power point 2015
Skills to Foster data protection power point 2015Skills to Foster data protection power point 2015
Skills to Foster data protection power point 2015
 
eMetrics Summit Boston 2014 - Big Data Marketing - From Über Creepy to Over ...
 eMetrics Summit Boston 2014 - Big Data Marketing - From Über Creepy to Over ... eMetrics Summit Boston 2014 - Big Data Marketing - From Über Creepy to Over ...
eMetrics Summit Boston 2014 - Big Data Marketing - From Über Creepy to Over ...
 
HIPAA Compliance For Small Practices
HIPAA Compliance For Small PracticesHIPAA Compliance For Small Practices
HIPAA Compliance For Small Practices
 
1 Explain the principle of privacy. What impact has IT made on priv.pdf
1 Explain the principle of privacy. What impact has IT made on priv.pdf1 Explain the principle of privacy. What impact has IT made on priv.pdf
1 Explain the principle of privacy. What impact has IT made on priv.pdf
 
Freedom of Information, What do We Know?
Freedom of Information, What do We Know?Freedom of Information, What do We Know?
Freedom of Information, What do We Know?
 

More from mlireton

Unique needs of persons served march 2012
Unique needs of persons served march 2012Unique needs of persons served march 2012
Unique needs of persons served march 2012mlireton
 
Rights of personnel
Rights of personnelRights of personnel
Rights of personnelmlireton
 
Financial purchasing and reimbursement
Financial purchasing and reimbursementFinancial purchasing and reimbursement
Financial purchasing and reimbursementmlireton
 
Customer service
Customer serviceCustomer service
Customer servicemlireton
 
Child abuse and neglect reporting 2012
Child abuse and neglect reporting 2012Child abuse and neglect reporting 2012
Child abuse and neglect reporting 2012mlireton
 
Cultural competence powerpoint new
Cultural competence powerpoint newCultural competence powerpoint new
Cultural competence powerpoint newmlireton
 
Infection control, communicable disease, universal precaution volunteers
Infection control, communicable disease, universal precaution volunteersInfection control, communicable disease, universal precaution volunteers
Infection control, communicable disease, universal precaution volunteersmlireton
 
Client rights
Client rightsClient rights
Client rightsmlireton
 
H&s identify unsafe environ-reduce physical risk for volunteers
H&s identify unsafe environ-reduce physical risk for volunteersH&s identify unsafe environ-reduce physical risk for volunteers
H&s identify unsafe environ-reduce physical risk for volunteersmlireton
 
Hipaa extras for clinical staff
Hipaa extras for clinical staffHipaa extras for clinical staff
Hipaa extras for clinical staffmlireton
 
Transportation training june 2013
Transportation training june 2013Transportation training june 2013
Transportation training june 2013mlireton
 

More from mlireton (11)

Unique needs of persons served march 2012
Unique needs of persons served march 2012Unique needs of persons served march 2012
Unique needs of persons served march 2012
 
Rights of personnel
Rights of personnelRights of personnel
Rights of personnel
 
Financial purchasing and reimbursement
Financial purchasing and reimbursementFinancial purchasing and reimbursement
Financial purchasing and reimbursement
 
Customer service
Customer serviceCustomer service
Customer service
 
Child abuse and neglect reporting 2012
Child abuse and neglect reporting 2012Child abuse and neglect reporting 2012
Child abuse and neglect reporting 2012
 
Cultural competence powerpoint new
Cultural competence powerpoint newCultural competence powerpoint new
Cultural competence powerpoint new
 
Infection control, communicable disease, universal precaution volunteers
Infection control, communicable disease, universal precaution volunteersInfection control, communicable disease, universal precaution volunteers
Infection control, communicable disease, universal precaution volunteers
 
Client rights
Client rightsClient rights
Client rights
 
H&s identify unsafe environ-reduce physical risk for volunteers
H&s identify unsafe environ-reduce physical risk for volunteersH&s identify unsafe environ-reduce physical risk for volunteers
H&s identify unsafe environ-reduce physical risk for volunteers
 
Hipaa extras for clinical staff
Hipaa extras for clinical staffHipaa extras for clinical staff
Hipaa extras for clinical staff
 
Transportation training june 2013
Transportation training june 2013Transportation training june 2013
Transportation training june 2013
 

Recently uploaded

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Recently uploaded (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

Hipaa basics

Editor's Notes

  1. HIPAA Basics: A crash course for CCFI employees and volunteers. Parts of this presentation are based on Oklahoma Department of Health training materials accessed through our OCAP contract.
  2. Who is CCFI’s Privacy Officer? Look no further than Rachelle Cook!
  3. HIPAA … what the heck is it?
  4. HIPAA provides a framework for the establishment of a nationwide protection of client confidentiality, security of electronic systems, and standards and requirements for electronic transmission of health information. Each part has separate regulations
  5. The Privacy Rule: Privacy means protecting someone’s health care info.
  6. Privacy regulations: Define how client information is used and disclosed. Give clients privacy rights and greater control over their own health information. Outline ways to safeguard Protected Health Information (PHI).
  7. The Security Rule: Security means controlling: - the confidentiality of electronic protected health information (ePHI). -How client data is electronically stored. -How client data is electronically accessed.
  8. Electronic Data Exchange defines the format of electronic transfers of information between providers and payers to carry out financial or administrative activities related to health care. Information includes coding, billing, and insurance verification.
  9. Choosing not to follow these rules: Could put you at risk. Could put CCFI at risk. You and CCFI can be subject to fines.
  10. We PROTECT PHI in all media created, stored or transmitted. Examples include: Verbal discussions (like in person, on the phone, etc.). Written on paper (like chart, progress note, encounter form, referral form, explanation of benefits (EOBs), scratch paper, etc.). Computer applications/systems (like electronic health record (EHR), Microsoft, etc.). Computer hardware/equipment ( like PCs, laptops, pagers, fax machines, servers, cell/multifunctional phones, and any removable media, etc.).
  11. We should treat personal electronic data with the same care and respect as weapons-grade plutonium. It is dangerous, long-lasting and once it has leaked, there's no getting it back.
  12. PHI is Individually Identifiable Health Information (IIHI) Reasonably identifies the individual (client identifiers/demographics).
  13. PHI includes items in the record, such as: Encounter/visit documentation Lab results Appointment dates/times Invoices Radiology films and reports Histories and physicals, etc.
  14. PHI includes information by which the identity of a client can be determined with reasonable accuracy and speed either directly or by reference to other publicly available information. For example, when Counselor Troi says “Captain of this ship,” her business friend buddy knows she’s talking about Captain Picard.
  15. Use: when you review or use PHI internally (audits, training, customer service, quality improvement). Disclose: when you release or provide PHI to someone, like an attorney, a client, faxing records to another provider, etc.
  16. What does releasing the minimum necessary PHI mean? To use or disclose/release only the minimum necessary to accomplish the intended purpose. When you get Requests from individuals not employed at CCFI: Keep info at a “need to know” basis. Limit the PHI provided to what is needed to accomplish the purpose for which the request was made or the information the client gives permission to disclose via CCFI release form or other valid authorization.
  17. What is TPO? Treatment – providing care to clients. Payment – the provision of benefits and premium payment. Operations – normal business activities like reporting, quality improvement, training, auditing, customer service and resolution of grievances data collection and eligibility checks, accreditation, etc. These terms are collectively referred to as TPO. PHI used outside of TPO is not allowed without a signed authorization. TPO must be within the minimum necessary to perform your job!
  18. Who protects HIPAA? The federal government through the laws of HIPAA. CCFI, by training folks on HIPAA, and having written policy around HIPAA, and you, by taking HIPAA seriously. Keep in mind, there are penalties for violations of HIPAA. The minimum civil monetary penalties are tiered based upon the entity’s culpability for the HIPAA violation. If you want more info on penalties, feel free to ask our privacy officer, Rachelle Cook!
  19. Clients have the right to file a privacy complaint. Direct all requests or complaints regarding these rights to the CCFI Privacy Officer Clients have lots of rights regarding their PHI. More of these rights are outlined in the training geared for clinicians.
  20. What are some common violations? When leaving his/her computer, an employee didn’t lock or log off the computer; another employee then utilized it to look up her own family members. In this situation, both employees did not follow CCFI’s procedures which require: Logging off/securing all applications when unattended. Using the password protected screensaver when leaving it unattended. Not using another person’s login, unless they are training you and directly observing what you do.
  21. A new employee is assigned to routinely enter charting notes for each client being seen by the provider with whom she works. She was curious and concerned about a particular client’s services, and therefore viewed several other records from the client’s chart from the previous months. Note: It was determined this was a breach of confidentiality as she was not requested by her provider and/or supervisor to access this client’s additional records.
  22. How can a technology problem be a violation? -Theft (or loss) of a computer, laptop. -Inappropriate usage of CCFI computers. -A technology-related situation which results in a significant adverse effect on people, process, technology, facilities, etc., such as: A system “glitch” which results in ePHI being accessed and/or sent to an inappropriate recipient. A virus that prevents users from being able to access PHI. If something like this happens, report the incident to the Privacy Officer.
  23. What is the misuse of PHI: Unauthorized… …Access to… …Using of… …Taking of… …Possession of… …Release of… …Edit of… …Destruction of… …Client PHI Without Authorization.
  24. How do mistakes happen?
  25. Human error, like: -Faxing to the wrong individual/location. -Wrong “sticky” client label placed on a document, then it is handed to the wrong client. -When typing a medical record number to look up an address, it is transposed. The lab results are then sent to the incorrect client. -When searching for a client’s address, her name is typed, her date of birth is not validated, and a client with the same name is selected instead. Here are some examples: -Jane Doe’s name, medical record number, and date of birth was placed on a prescription and handed to Molly Sue. Is this considered a breach of confidentiality? -Yes. If Molly Sue reads Jane Doe’s name on this form, or any other document, it is a breach of confidentiality. Request Molly Sue to return the incorrect prescription and forward it with an incident report to the Privacy Officer. A reminder letter for start of services was mailed to the wrong client. Is this a breach of confidentiality? Yes. It is a breach of confidentiality if the letter includes a different client’s name. Request the client to return the incorrect letter, document the disclosure, and forward it with an incident report to the Privacy Officer.
  26. A client requested we send 2006 test results to her provider. In addition to the 2006 test results, we also released 2004 and 2005 test results. Is this a breach of confidentiality? Yes. This is a breach of confidentiality as more information than was requested by the client was released (the 2004 and 2005 test results). Always keep in mind we may only release the minimum necessary PHI to accomplish the purpose of the request – even when releasing to another treating provider, insurance company, etc. Request the provider to return the 2004 and 2005 test results, and forward them with an incident report to the Privacy Officer.
  27. A reminder letter for start of services was mailed to the wrong client. Is this a breach of confidentiality? Yes. It is a breach of confidentiality if the letter includes a different client’s name. Request the client to return the incorrect letter, document the disclosure, and forward it with an incident report to the Privacy Officer.
  28. A spouse answers the phone, or the voice mail picks up. What information may I provide? State your first name and that you are calling from CCFI. Ask the client to return your call, and provide your direct phone number. Do not provide lab results, or other detailed information. Example: “This is Sally from CCFI calling for Johnny Doe. Please call me back at your earliest convenience at [number]. Thank you.” Double check you ended the call.
  29. You never know who may overhear you discussing a client. Another client or coworker could be the client’s neighbor, best friend, cousin, etc… Remember to talk quietly. When possible, discuss PHI privately, such as behind a closed door. Avoid having discussions in client waiting rooms, elevators, cafeteria, etc.
  30. You’re walking through the grocery store one day, and see a CCFI client. What should you do? It’s ok to say hello but don’t ask the client “how she’s doing” or questions about her health/services. It’s ok to listen if she offers to update you on her health/services. Let the client approach you first, but don’t make it seem like you are trying to avoid her.
  31. When you are delivering PHI internally, keep it close to your person, and turn papers over so people can’t see them. When necessary to transport PHI externally: Place in a locked, closed container; Place PHI in the trunk of your locked vehicle or in the back of a locked SUV out of sight; And Remember, You may not transport client charts offsite unless authorized to do so. Send all PHI in sealed confidential envelopes. Verify all PHI was removed from the outside of envelope before stuffing it. Confirm you are sending the correct PHI. Place in mailbox or deliver to person. Do not leave unattended in an office. All confidential material must be locked up at the end of the workday.
  32. Secure PHI when you leave your desk so others cannot read it. If you have an office, you have the option of closing your door instead. Turn over/cover PHI when a coworker approaches you to discuss something other than that PHI. Don’t leave documents containing PHI unattended in fax machines, printers, or copiers. Check your fax machine frequently so documents are not left on the machine. Remember, if you have confidential info on paper that needs to be disposed of, it needs to be shredded. If you have electronic equipment (like a flash drive) with confidential info that needs to be disposed of, give it to the privacy officer.
  33. There are three types of violations: Incidental Accidental Intentional Incidental Example: Person in the waiting room recognizes someone else in the room, and realizes they are coming to CCFI for services. This situation is incidental, and there wasn’t much you could have done to avoid the situation. Incidental disclosures are going to happen…even in the best of circumstances. An incidental disclosure is not a privacy incident. This type of disclosure is not required to be documented. Accidental Mistakes happen. If you mistakenly disclose PHI or provide confidential information to an unauthorized person or if you breach the security of confidential data: Acknowledge the mistake and notify your supervisor and the CCFI Privacy Officer immediately. Learn from the error and help revise procedures (when necessary) to prevent it from happening again. Assist in correcting the error only as requested by your leader or the CCFI Privacy Officer. Don’t cover up or try to make it “right” by yourself. Intentional If you ignore the rules and carelessly or deliberately use or disclose protected health or confidential information, you can expect: Disciplinary action, up to and including termination. Civil and/or criminal charges. Possible monetary penalties. Examples include: Accessing PHI for purposes other than assigned job responsibilities. Attempting to learn or use another person’s access to information.
  34. If you are aware or suspicious of an accidental or intentional HIPAA violation, it is your responsibility to report it. CCFI may not intimidate, threaten, coerce, discriminate against, or take other retaliatory action against anyone who in good faith reports a violation (whistle blowing). It is important to report violations so … So they can be investigated, managed, and documented. So they can be prevented from happening again in the future. So damages can be kept to a minimum. To minimize your personal risk. In some instances, management may have to notify affected parties of lost, stolen, or compromised data. Incidental disclosures need not be reported, but if you’re not sure, report them anyway.
  35. Shred or place all confidential paper in the designated confidential paper bins. Does this include Post-it notes, scratch paper, envelopes, and old non-confidential documents we no longer need? Non-confidential is the qualifier…if you have any PHI on that Post-It note, then it needs to be shred. If you write a client name on a pizza box, it needs to be shredded/blacked-out/burned If you have doodles on scratch paper then it can be placed in the recycle bin. How should I dispose of electronic media, like a floppy disk, CD, USB Drive, etc.)? Provide electronic media to Privacy Officer to dispose of it.
  36. Remember, it is your responsibility, as an CCFI employee or provider, to comply with all privacy and security laws, regulations, and CCFI’s policies pertaining to them. Questions? Ask our privacy officer, Rachelle Cook!