Top Banner
HIPAA HIPAA H H ealth ealth I I nsurance nsurance P P ortability and ortability and A A ccountability ccountability A A ct ct
24

HIPAA

Dec 31, 2015

Download

Documents

rae-deleon

HIPAA. H ealth I nsurance P ortability and A ccountability A ct. Purposes of HIPAA. Signed into law in 1996 as a response to concerns regarding confidential health information. Provide continuity and portability of health benefits to people in between jobs. - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: HIPAA

HIPAAHIPAAHHealth ealth IInsurance nsurance

PPortability and ortability and AAccountability ccountability AActct

Page 2: HIPAA

Purposes of HIPAAPurposes of HIPAA Signed into law in 1996 as a response to concerns regarding Signed into law in 1996 as a response to concerns regarding

confidential health information.confidential health information.

Provide continuity and portability of health benefits to people in Provide continuity and portability of health benefits to people in between jobs. between jobs.

Ensure security and privacy of individual health information.Ensure security and privacy of individual health information.

Reduce administrative expenses in the healthcare system; Reduce administrative expenses in the healthcare system; administrative costs have been estimated to account for nearly 25% administrative costs have been estimated to account for nearly 25% of healthcare costs.of healthcare costs.

Provide uniform standards for electronic health information Provide uniform standards for electronic health information

transactions. transactions.

Page 3: HIPAA

Some ReassuranceSome Reassurance

According to the American Health Information According to the American Health Information Management Association, an average of 150 Management Association, an average of 150 people will have access to your private health people will have access to your private health information when you are admitted to the hospital information when you are admitted to the hospital for a minor procedure (2 Days and 2 nights).for a minor procedure (2 Days and 2 nights).

HIPAA ensures that those who have access to your HIPAA ensures that those who have access to your health information are authorized and they will health information are authorized and they will use it appropriately. use it appropriately.

Page 4: HIPAA

Protected Health Protected Health InformationInformation

(PHI)(PHI) The purpose of the HIPAA Privacy The purpose of the HIPAA Privacy

Rule is to protect and secure patients’ Rule is to protect and secure patients’ Protected Health Information. PHI is Protected Health Information. PHI is information that relates to the past, information that relates to the past, present or future health of an present or future health of an individual, the provision of health individual, the provision of health care, or payment for the provision of care, or payment for the provision of health care to an individual, and health care to an individual, and which either identifies or could be which either identifies or could be used to identify a specific individual. used to identify a specific individual.

Page 5: HIPAA

De-identified and De-identified and Limited Use Limited Use Datasets……Datasets……

Page 6: HIPAA

A A de-identified datade-identified data set set must exclude……must exclude……

NamesNames DatesDates Street addressesStreet addresses Telephone and FAX Telephone and FAX

Numbers Numbers E-mail addressesE-mail addresses Social security numbersSocial security numbers Medical record numbersMedical record numbers Health plan beneficiary Health plan beneficiary

numbersnumbers Account numbersAccount numbers

License and certificate License and certificate numbersnumbers

Vehicle identifiersVehicle identifiers Device serial numbersDevice serial numbers URLsURLs IP Address NumbersIP Address Numbers PhotographsPhotographs Biometric Identifiers Biometric Identifiers

(finger prints, voice prints) (finger prints, voice prints) Unique Identifying Unique Identifying

NumbersNumbers

Page 7: HIPAA

A A Limited Use Data Set Limited Use Data Set may may include….include….

Dates Dates AdmissionAdmission DischargeDischarge Service datesService dates Payment datesPayment dates Dates of birth and deathDates of birth and death

Geographic DataGeographic Data

5-digit zip code5-digit zip code State, County, City, and Precinct State, County, City, and Precinct

Page 8: HIPAA

Research and HIPAAResearch and HIPAA

Situations in which PHI may be used for Situations in which PHI may be used for research purposes:research purposes: By de-identification of PHIBy de-identification of PHI With individual authorizationWith individual authorization With waiver of authorization by Privacy BoardWith waiver of authorization by Privacy Board As a Limited Data Set with Data Use As a Limited Data Set with Data Use

AgreementAgreement As an activity preparatory to researchAs an activity preparatory to research For research on decedent’s informationFor research on decedent’s information

Page 9: HIPAA

Research and PHIResearch and PHI

Covered Entities can use or disclose PHI for Covered Entities can use or disclose PHI for purposes of research, but only in an purposes of research, but only in an aggregate fashion when the researcher aggregate fashion when the researcher meets specific procedural guidelines. meets specific procedural guidelines.

Page 10: HIPAA

Be Careful!!!Be Careful!!! HIPAA will be enforced through a complaint HIPAA will be enforced through a complaint

process with the U.S. Department of Health and process with the U.S. Department of Health and Human Services and also enforced at the covered Human Services and also enforced at the covered agency/program level. agency/program level.

Penalties for HIPAA violations range from $100 to Penalties for HIPAA violations range from $100 to $250,000 and may include imprisonment. $250,000 and may include imprisonment.

Page 11: HIPAA

Things to Remember when Things to Remember when working with Confidential working with Confidential

DataData Talk on the phone in closed quarters and avoid Talk on the phone in closed quarters and avoid what you disclose out loud.what you disclose out loud.

Close doors and speak softly when discussing Close doors and speak softly when discussing data.data.

Avoid discussions in elevators, cafeteria lines, or Avoid discussions in elevators, cafeteria lines, or anywhere else someone may hear you.anywhere else someone may hear you.

Page 12: HIPAA

Do not leave messages on answering machines discussing Do not leave messages on answering machines discussing individuals’ data. Avoid paging, text messaging, or individuals’ data. Avoid paging, text messaging, or instant messaging information involving data.instant messaging information involving data.

Documents containing PHI should not be sent by fax Documents containing PHI should not be sent by fax unless they are being faxed to a secure office. This unless they are being faxed to a secure office. This should be discouraged though.should be discouraged though.

Avoid leaving data on your computer screen when you Avoid leaving data on your computer screen when you leave your desk. It is best to log off of your computer leave your desk. It is best to log off of your computer and keep it secured.and keep it secured.

Do not log on to a computer and then allow others access Do not log on to a computer and then allow others access via your password.via your password.

Try to position your computer so that it is not facing a Try to position your computer so that it is not facing a window or a door. It should not be viewable by anyone window or a door. It should not be viewable by anyone walking by.walking by.

Page 13: HIPAA

Never leave data out of your site. When it is in your Never leave data out of your site. When it is in your possession it is your responsibility to keep it safeguarded.possession it is your responsibility to keep it safeguarded.

When you are done working with data return it to its When you are done working with data return it to its appropriate location.appropriate location.

Make sure any document with identifiers that is ready to Make sure any document with identifiers that is ready to be discarded is immediately shredded.be discarded is immediately shredded.

Anything containing files, such as a file cabinet, must be Anything containing files, such as a file cabinet, must be locked at all times.locked at all times.

All computers must be password protected.All computers must be password protected.

Change your computer password regularly.Change your computer password regularly.

Page 14: HIPAA

Data should not be sent through email.Data should not be sent through email.

All computer devices should be maintained with All computer devices should be maintained with appropriate anti-virus and anti- Spyware appropriate anti-virus and anti- Spyware software.software.

All electronic computing and communication All electronic computing and communication devices, must be stripped of all data prior to devices, must be stripped of all data prior to disposal or reuse.disposal or reuse.

Data should be routinely backed up.Data should be routinely backed up.

Page 15: HIPAA

Avoid sharing health information with co-workers Avoid sharing health information with co-workers who may not have a "need to know." who may not have a "need to know."

Keep and protect written health information in Keep and protect written health information in the work environment from the eyes of others who the work environment from the eyes of others who do not need the information in order to perform do not need the information in order to perform their assigned job.their assigned job.

Make sure casual visitors cannot wander into Make sure casual visitors cannot wander into areas in which data is kept. areas in which data is kept.

Page 16: HIPAA

Recognize when health information about a Recognize when health information about a person can be shared without the person’s person can be shared without the person’s permission, and when written or oral permission permission, and when written or oral permission of the person is required. of the person is required.

Make sure that if you have access to confidential Make sure that if you have access to confidential or private information about a person, you follow or private information about a person, you follow all policies or procedures for safeguarding the all policies or procedures for safeguarding the confidentiality of that information.confidentiality of that information.

Page 17: HIPAA

If it is appropriate to destroy records containing PHI, If it is appropriate to destroy records containing PHI, be sure to shred it completely. be sure to shred it completely.

If discarding records where the records contain PHI in If discarding records where the records contain PHI in digital format, destroy the diskette physically; don't digital format, destroy the diskette physically; don't just throw the disk away.just throw the disk away.

Documents, data printouts, Floppy disks, CDs, zip Documents, data printouts, Floppy disks, CDs, zip disks, tapes containing backups for data, and other disks, tapes containing backups for data, and other removable media which contain PHI must be stored in removable media which contain PHI must be stored in facilities with at least two different locks. Ordinarily, facilities with at least two different locks. Ordinarily, this means that they should be stored in a locked filing this means that they should be stored in a locked filing cabinet/desk within a locked office. cabinet/desk within a locked office.

Page 18: HIPAA

The Security of The Security of PasswordsPasswords

Passwords should be protected by each individual, Passwords should be protected by each individual, therefore individuals should:therefore individuals should: 1. Not share passwords with anyone else1. Not share passwords with anyone else 2. Not log onto a PHI repository for anyone else2. Not log onto a PHI repository for anyone else 3. Keep written records of passwords under lock and key3. Keep written records of passwords under lock and key 4. Change passwords periodically4. Change passwords periodically 5. Use passwords that are5. Use passwords that are

Difficult to guessDifficult to guess Contain at least six alphanumeric charactersContain at least six alphanumeric characters

Page 19: HIPAA

Frequently Asked Frequently Asked Questions and Questions and

Answers…..Answers…..

Page 20: HIPAA

Individuals Access to Individuals Access to Research RecordsResearch Records

Q:Q: HIPAA establishes patient rights to inspect and HIPAA establishes patient rights to inspect and amend PHI. Does this mean that I have to allow amend PHI. Does this mean that I have to allow research subjects access to the research record?research subjects access to the research record?

A:A: No, unless the clinical information is stored in No, unless the clinical information is stored in their “designated record set” (DRS). Patients have their “designated record set” (DRS). Patients have the right to inspect and request amendment of the right to inspect and request amendment of their DRS. The research record is not a part of the their DRS. The research record is not a part of the DRS unless it is used to make decisions about the DRS unless it is used to make decisions about the subject outside of the research context. subject outside of the research context.

Page 21: HIPAA

Revoking AuthorizationRevoking Authorization Q:Q: HIPAA allows individuals to revoke an HIPAA allows individuals to revoke an

authorization. Does this mean that a research authorization. Does this mean that a research subject could revoke his/her consent/authorization subject could revoke his/her consent/authorization to participate in a protocol and I would have to to participate in a protocol and I would have to discard his/her data?discard his/her data?

A:A: No. You may continue to use and disclose the No. You may continue to use and disclose the PHI that was collected prior to the subject’s PHI that was collected prior to the subject’s revocation of consent/authorization. You may not revocation of consent/authorization. You may not collect any new PHI or engage in any further collect any new PHI or engage in any further research interactions with this withdrawn subject.research interactions with this withdrawn subject.

Page 22: HIPAA

Sending Data to Research Sending Data to Research SponsorsSponsors

Q:Q: Do I need a Business Associate Agreement or a Do I need a Business Associate Agreement or a Data Use Agreement to send data, including PHI Data Use Agreement to send data, including PHI to a research sponsor?to a research sponsor?

A:A: No. The contract with the sponsor will stipulate No. The contract with the sponsor will stipulate their compliance with the HIPAA regulations and their compliance with the HIPAA regulations and the informed consent/authorization form will the informed consent/authorization form will inform subjects of this disclosure.inform subjects of this disclosure.

Page 23: HIPAA

Sending Data to other Sending Data to other InstitutionsInstitutions

Q:Q: I need to send data to a colleague at another I need to send data to a colleague at another institution for statistical analysis. Does HIPAA institution for statistical analysis. Does HIPAA permit this?permit this?

A:A: Yes. State in the informed Yes. State in the informed consent/authorization form that you will be consent/authorization form that you will be sending PHI to this colleague. Consented subjects sending PHI to this colleague. Consented subjects will have given their approval for this disclosure will have given their approval for this disclosure and you need do nothing further. and you need do nothing further.

Page 24: HIPAA

ReferencesReferences Yale University Clinical’s guide to HIPAA Privacy Yale University Clinical’s guide to HIPAA Privacy

http://hipaa.yale.edu/training/VisitingClinician.pdfhttp://hipaa.yale.edu/training/VisitingClinician.pdf

NYS Governor’s Office of Employee Relations NYS Governor’s Office of Employee Relations http://www.goer.state.ny.us/Train/onlinelearning/HIP/intro.html http://www.goer.state.ny.us/Train/onlinelearning/HIP/intro.html

OHSU Integrity Office: HIPAA and Research: FAQs OHSU Integrity Office: HIPAA and Research: FAQs http://www.ohsu.edu/cc/hipaa/researchfaq.shtml http://www.ohsu.edu/cc/hipaa/researchfaq.shtml

Privacy, Security and Data Transaction Policies: Division of BiostatisticsPrivacy, Security and Data Transaction Policies: Division of Biostatisticshttp://www.biostat.wustl.edu/research/division.security.policies5.pdf#searchttp://www.biostat.wustl.edu/research/division.security.policies5.pdf#search=%22Level%201%20and%20Level%202%20PHI%20limited%20datah=%22Level%201%20and%20Level%202%20PHI%20limited%20data%20set%22 %20set%22