SlideShare ist ein Scribd-Unternehmen logo
1 von 54
To HIPAA and Beyond The Law of Confidentiality and Security   December, 2010 By John R. Wible, General Counsel Alabama Department of Public Health ADPH, 2010
Documentation ,[object Object],[object Object],[object Object],ADPH, 2010
The “Golden Rule of Documentation” ,[object Object],[object Object],[object Object],[object Object],ADPH, 2010
Confidentiality-  Access to Records Generally ,[object Object],[object Object],[object Object],[object Object],ADPH, 2010
Conditions for  Release of Information ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],ADPH, 2010
TB/STD/DC Records  Special Confidentiality ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],ADPH, 2010
Disease Control Guidelines ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],ADPH, 2010
Confidential  Information (EPI) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],ADPH, 2010
Released With Authorization ,[object Object],[object Object],ADPH, 2010
Written Authorization  Not Required: ,[object Object],[object Object],[object Object],ADPH, 2010
What Makes a Valid Authorization? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],ADPH, 2010
Note Concerning Certain Information ,[object Object],[object Object],ADPH, 2010
Release of Contact  Information – Don’t Do It! ,[object Object],[object Object],[object Object],ADPH, 2010
Confidentiality – Access to Medical Records of Minors ,[object Object],[object Object],ADPH, 2010
Access to Medical Records of Minors – Rights of the Parents ,[object Object],[object Object],[object Object],ADPH, 2010
HIPAA – In Brief ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PHI – What is it? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Privacy Rule:  What and Who Is Covered? ,[object Object],[object Object],[object Object],[object Object],ADPH, 2010
Releases without Written Consent ,[object Object],[object Object],[object Object],[object Object],ADPH, 2010
Business Associates ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],ADPH, 2010
Business Associates and AARA ,[object Object],[object Object],[object Object],[object Object],[object Object],ADPH, 2010
HIPPA Privacy Rule: Who is Not Covered? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],ADPH, 2010
HIPPA Privacy Rule:  What Is Not Covered? ,[object Object],[object Object],[object Object],[object Object],[object Object],ADPH, 2010
HIPAA - What it Doesn’t Do ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],ADPH, 2010
HIPAA and ADPH Privacy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],ADPH, 2010 ,[object Object]
How Uses/Disclosures Are Regulated ,[object Object],[object Object],ADPH, 2010
Permitted Disclosures ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],ADPH, 2010
Disclosure to Police ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],ADPH, 2010
Disclosure to National Security Agencies ,[object Object],ADPH, 2010
Disclosure  To  Public Health ,[object Object],[object Object],ADPH, 2010
Child or Elder Abuse Notice ,[object Object],[object Object],[object Object],ADPH, 2010
Information on Decedents ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],ADPH, 2010
Maintenance of Documentation ,[object Object],[object Object],[object Object],[object Object],ADPH, 2010
HIPAA -  The Security Rule ,[object Object],[object Object],[object Object],[object Object],[object Object],ADPH, 2010
What about e-PHI? ,[object Object],[object Object],[object Object]
Security of the Premises ,[object Object],[object Object],[object Object],[object Object],ADPH, 2010
Building Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Paper Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Use of Department Computers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],ADPH, 2010
Use of Computers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],ADPH, 2010
Email and Internet Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Laptop Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Patient Accounting ,[object Object],[object Object],[object Object],[object Object],[object Object],ADPH, 2010
Patient Accounting ,[object Object],[object Object],[object Object],[object Object],[object Object],ADPH, 2010
HIPAA Log ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],ADPH, 2010
Required Logged Items ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],ADPH, 2010
Disclosures  Not  Logged ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],ADPH, 2010
HIPAA Breaches ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],“ Teton Dam Breach” ADPH, 2010
BREACHES - PENALTIES ,[object Object],[object Object],[object Object],[object Object],[object Object],ADPH, 2010
Program Management ,[object Object],[object Object],[object Object],[object Object],ADPH, 2010
Red Flag Regulations  ,[object Object],[object Object],[object Object],ADPH, 2010
Categories of “Red Flags” ,[object Object],[object Object],[object Object],[object Object],[object Object],ADPH, 2010
See Also Policy Documents ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],ADPH, 2010
For A Copy of the Presentation ,[object Object],[object Object],7 Slideshare ADPH, 2011

Weitere ähnliche Inhalte

Was ist angesagt?

Welcome to HIPAA Training
Welcome to HIPAA TrainingWelcome to HIPAA Training
Welcome to HIPAA TrainingJonathan Montes
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA BasicsKarna *
 
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)Sanjeev Bharwan
 
HIPAA 101- What all Doctors NEED to know
HIPAA 101- What all Doctors NEED to knowHIPAA 101- What all Doctors NEED to know
HIPAA 101- What all Doctors NEED to knowCompliancy Group
 
HIPPA-Health Insurance Portability and Accountability Act
HIPPA-Health Insurance Portability and Accountability ActHIPPA-Health Insurance Portability and Accountability Act
HIPPA-Health Insurance Portability and Accountability ActHarshit Trivedi
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippamaggie_Platt
 
HIPAA Training - 2011
HIPAA Training - 2011HIPAA Training - 2011
HIPAA Training - 2011darichardson
 
Introduction to HIPAA and Confidentiality for Employees
Introduction to HIPAA and Confidentiality for EmployeesIntroduction to HIPAA and Confidentiality for Employees
Introduction to HIPAA and Confidentiality for EmployeesHouse of New Hope
 
Rights of Persons Served MH Ohio
Rights of Persons Served MH OhioRights of Persons Served MH Ohio
Rights of Persons Served MH OhioHouse of New Hope
 
HIPAA AND INFORMATION TECHNOLOGY
HIPAA AND INFORMATION TECHNOLOGYHIPAA AND INFORMATION TECHNOLOGY
HIPAA AND INFORMATION TECHNOLOGYmariaradziminski
 
Health Insurance Portability and Accountability Act (HIPPA) - Kloudlearn
Health Insurance Portability and Accountability Act (HIPPA) - KloudlearnHealth Insurance Portability and Accountability Act (HIPPA) - Kloudlearn
Health Insurance Portability and Accountability Act (HIPPA) - KloudlearnKloudLearn
 
Hippa training for healthcare employees
Hippa training for healthcare employeesHippa training for healthcare employees
Hippa training for healthcare employeesaminahallen
 
Hippa training on confidentiality
Hippa training on confidentialityHippa training on confidentiality
Hippa training on confidentialitycraig45365
 
Mandatory hippa and information security
Mandatory hippa and information securityMandatory hippa and information security
Mandatory hippa and information securityHiggi123
 

Was ist angesagt? (20)

Annual HIPAA Training
Annual HIPAA TrainingAnnual HIPAA Training
Annual HIPAA Training
 
Welcome to HIPAA Training
Welcome to HIPAA TrainingWelcome to HIPAA Training
Welcome to HIPAA Training
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA Basics
 
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)
 
HIPAA 101- What all Doctors NEED to know
HIPAA 101- What all Doctors NEED to knowHIPAA 101- What all Doctors NEED to know
HIPAA 101- What all Doctors NEED to know
 
UNA HIPAA Training 8-13
UNA HIPAA Training   8-13UNA HIPAA Training   8-13
UNA HIPAA Training 8-13
 
HIPPA-Health Insurance Portability and Accountability Act
HIPPA-Health Insurance Portability and Accountability ActHIPPA-Health Insurance Portability and Accountability Act
HIPPA-Health Insurance Portability and Accountability Act
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippa
 
Basic HIPAA Training by CMU
Basic HIPAA Training by CMUBasic HIPAA Training by CMU
Basic HIPAA Training by CMU
 
HIPAA Training - 2011
HIPAA Training - 2011HIPAA Training - 2011
HIPAA Training - 2011
 
Introduction to HIPAA and Confidentiality for Employees
Introduction to HIPAA and Confidentiality for EmployeesIntroduction to HIPAA and Confidentiality for Employees
Introduction to HIPAA and Confidentiality for Employees
 
HIPAA HITECH training 7-9-12
HIPAA HITECH training 7-9-12HIPAA HITECH training 7-9-12
HIPAA HITECH training 7-9-12
 
Rights of Persons Served MH Ohio
Rights of Persons Served MH OhioRights of Persons Served MH Ohio
Rights of Persons Served MH Ohio
 
The Basics of HIPAA
The Basics of HIPAA The Basics of HIPAA
The Basics of HIPAA
 
HIPAA AND INFORMATION TECHNOLOGY
HIPAA AND INFORMATION TECHNOLOGYHIPAA AND INFORMATION TECHNOLOGY
HIPAA AND INFORMATION TECHNOLOGY
 
Health Insurance Portability and Accountability Act (HIPPA) - Kloudlearn
Health Insurance Portability and Accountability Act (HIPPA) - KloudlearnHealth Insurance Portability and Accountability Act (HIPPA) - Kloudlearn
Health Insurance Portability and Accountability Act (HIPPA) - Kloudlearn
 
Hippa training for healthcare employees
Hippa training for healthcare employeesHippa training for healthcare employees
Hippa training for healthcare employees
 
HIPAA Basics by Brian Fleetham
HIPAA Basics by Brian FleethamHIPAA Basics by Brian Fleetham
HIPAA Basics by Brian Fleetham
 
Hippa training on confidentiality
Hippa training on confidentialityHippa training on confidentiality
Hippa training on confidentiality
 
Mandatory hippa and information security
Mandatory hippa and information securityMandatory hippa and information security
Mandatory hippa and information security
 

Andere mochten auch

Hosp disasterplanning.wva
Hosp disasterplanning.wvaHosp disasterplanning.wva
Hosp disasterplanning.wvaJohn Wible
 
Ethics usaems11class
Ethics usaems11classEthics usaems11class
Ethics usaems11classJohn Wible
 
Ethics tulane2012
Ethics tulane2012Ethics tulane2012
Ethics tulane2012John Wible
 
Immigration presentation3 final
Immigration presentation3 finalImmigration presentation3 final
Immigration presentation3 finalJohn Wible
 
Xmas.poem.2011.the puriwat of rajpur
Xmas.poem.2011.the puriwat of rajpurXmas.poem.2011.the puriwat of rajpur
Xmas.poem.2011.the puriwat of rajpurJohn Wible
 
Prayer.4.text.02.01.15.murray
Prayer.4.text.02.01.15.murrayPrayer.4.text.02.01.15.murray
Prayer.4.text.02.01.15.murrayJohn Wible
 
Ss.01.26.14.ps.19.god exists.comentary
Ss.01.26.14.ps.19.god exists.comentarySs.01.26.14.ps.19.god exists.comentary
Ss.01.26.14.ps.19.god exists.comentaryJohn Wible
 
7.20.14.active.faith.1.pet.1.cont. commentary
7.20.14.active.faith.1.pet.1.cont. commentary7.20.14.active.faith.1.pet.1.cont. commentary
7.20.14.active.faith.1.pet.1.cont. commentaryJohn Wible
 
The pressure of conflict.092913
The pressure of conflict.092913The pressure of conflict.092913
The pressure of conflict.092913John Wible
 
030914.who.work.eph.6.commentary
030914.who.work.eph.6.commentary030914.who.work.eph.6.commentary
030914.who.work.eph.6.commentaryJohn Wible
 
Immigration.social.work
Immigration.social.workImmigration.social.work
Immigration.social.workJohn Wible
 
German ortiz 11-03
German ortiz 11-03German ortiz 11-03
German ortiz 11-03agh-1103
 
Mapa de procesos luditics
Mapa de procesos luditicsMapa de procesos luditics
Mapa de procesos luditicsandreswin
 
Double page-spread
Double page-spreadDouble page-spread
Double page-spreadmason1
 
Menu navidad 2011 nº1
Menu navidad 2011 nº1Menu navidad 2011 nº1
Menu navidad 2011 nº1Jesús Díaz
 
Relacao bens adquiridos_produzidos
Relacao bens adquiridos_produzidosRelacao bens adquiridos_produzidos
Relacao bens adquiridos_produzidosetneves2011
 
030 leather furniture
030 leather furniture030 leather furniture
030 leather furnitureWillamJohns
 

Andere mochten auch (20)

Hosp disasterplanning.wva
Hosp disasterplanning.wvaHosp disasterplanning.wva
Hosp disasterplanning.wva
 
Ethics usaems11class
Ethics usaems11classEthics usaems11class
Ethics usaems11class
 
Ethics tulane2012
Ethics tulane2012Ethics tulane2012
Ethics tulane2012
 
Immigration presentation3 final
Immigration presentation3 finalImmigration presentation3 final
Immigration presentation3 final
 
Xmas.poem.2011.the puriwat of rajpur
Xmas.poem.2011.the puriwat of rajpurXmas.poem.2011.the puriwat of rajpur
Xmas.poem.2011.the puriwat of rajpur
 
Prayer.4.text.02.01.15.murray
Prayer.4.text.02.01.15.murrayPrayer.4.text.02.01.15.murray
Prayer.4.text.02.01.15.murray
 
Ss.01.26.14.ps.19.god exists.comentary
Ss.01.26.14.ps.19.god exists.comentarySs.01.26.14.ps.19.god exists.comentary
Ss.01.26.14.ps.19.god exists.comentary
 
7.20.14.active.faith.1.pet.1.cont. commentary
7.20.14.active.faith.1.pet.1.cont. commentary7.20.14.active.faith.1.pet.1.cont. commentary
7.20.14.active.faith.1.pet.1.cont. commentary
 
The pressure of conflict.092913
The pressure of conflict.092913The pressure of conflict.092913
The pressure of conflict.092913
 
030914.who.work.eph.6.commentary
030914.who.work.eph.6.commentary030914.who.work.eph.6.commentary
030914.who.work.eph.6.commentary
 
Immigration.social.work
Immigration.social.workImmigration.social.work
Immigration.social.work
 
German ortiz 11-03
German ortiz 11-03German ortiz 11-03
German ortiz 11-03
 
tarea 2
tarea 2tarea 2
tarea 2
 
Mapa de procesos luditics
Mapa de procesos luditicsMapa de procesos luditics
Mapa de procesos luditics
 
Double page-spread
Double page-spreadDouble page-spread
Double page-spread
 
Menu navidad 2011 nº1
Menu navidad 2011 nº1Menu navidad 2011 nº1
Menu navidad 2011 nº1
 
Relacao bens adquiridos_produzidos
Relacao bens adquiridos_produzidosRelacao bens adquiridos_produzidos
Relacao bens adquiridos_produzidos
 
Cafeteria
CafeteriaCafeteria
Cafeteria
 
Tecnologia 7 a
Tecnologia 7 aTecnologia 7 a
Tecnologia 7 a
 
030 leather furniture
030 leather furniture030 leather furniture
030 leather furniture
 

Ähnlich wie Hipaa.uo a

Rev hipa aforjulia10
Rev hipa aforjulia10Rev hipa aforjulia10
Rev hipa aforjulia10John Wible
 
Ems.documentation.2010.final
Ems.documentation.2010.finalEms.documentation.2010.final
Ems.documentation.2010.finalJohn Wible
 
Week 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy trainingWeek 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy trainingvrgill22
 
HIPAA INSERVICE 2017
HIPAA INSERVICE 2017 HIPAA INSERVICE 2017
HIPAA INSERVICE 2017 Meg Oser
 
Hipaa basics pp2
Hipaa basics pp2Hipaa basics pp2
Hipaa basics pp2martykoepke
 
Hippa and Confidentiality
Hippa and ConfidentialityHippa and Confidentiality
Hippa and Confidentialityramonapage
 
Hippa training for healthcare employees
Hippa training for healthcare employeesHippa training for healthcare employees
Hippa training for healthcare employeesaminahallen
 
HIPAA Privacy Training by University of Hawaii
HIPAA Privacy Training by University of HawaiiHIPAA Privacy Training by University of Hawaii
HIPAA Privacy Training by University of HawaiiAtlantic Training, LLC.
 
Mha 690 week one discussion ii
Mha 690 week one discussion iiMha 690 week one discussion ii
Mha 690 week one discussion iibeleza1669
 
Mha 690 week one discussion ii
Mha 690 week one discussion iiMha 690 week one discussion ii
Mha 690 week one discussion iibeleza1669
 
Tiffany hall mha 690 week 1 discussion 2
Tiffany hall mha 690 week 1   discussion 2Tiffany hall mha 690 week 1   discussion 2
Tiffany hall mha 690 week 1 discussion 2tiffhall
 
Tiffany hall mha 690 week 1 discussion 2
Tiffany hall mha 690 week 1   discussion 2Tiffany hall mha 690 week 1   discussion 2
Tiffany hall mha 690 week 1 discussion 2tiffhall
 
Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)bholmes
 

Ähnlich wie Hipaa.uo a (20)

Rev hipa aforjulia10
Rev hipa aforjulia10Rev hipa aforjulia10
Rev hipa aforjulia10
 
Ems.documentation.2010.final
Ems.documentation.2010.finalEms.documentation.2010.final
Ems.documentation.2010.final
 
Hipaa inservice
Hipaa inserviceHipaa inservice
Hipaa inservice
 
Week 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy trainingWeek 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy training
 
HIPAA INSERVICE 2017
HIPAA INSERVICE 2017 HIPAA INSERVICE 2017
HIPAA INSERVICE 2017
 
Hipaa basics pp2
Hipaa basics pp2Hipaa basics pp2
Hipaa basics pp2
 
Hipaa
HipaaHipaa
Hipaa
 
HIPAA 2010
HIPAA  2010HIPAA  2010
HIPAA 2010
 
Hippa and Confidentiality
Hippa and ConfidentialityHippa and Confidentiality
Hippa and Confidentiality
 
Hippa
HippaHippa
Hippa
 
HIPAA Training by UCSD
HIPAA Training by UCSDHIPAA Training by UCSD
HIPAA Training by UCSD
 
HIPAA
HIPAAHIPAA
HIPAA
 
Hippa training for healthcare employees
Hippa training for healthcare employeesHippa training for healthcare employees
Hippa training for healthcare employees
 
HIPAA Privacy Training by University of Hawaii
HIPAA Privacy Training by University of HawaiiHIPAA Privacy Training by University of Hawaii
HIPAA Privacy Training by University of Hawaii
 
Mha 690 week one discussion ii
Mha 690 week one discussion iiMha 690 week one discussion ii
Mha 690 week one discussion ii
 
Mha 690 week one discussion ii
Mha 690 week one discussion iiMha 690 week one discussion ii
Mha 690 week one discussion ii
 
HIPAA Complaince
HIPAA ComplainceHIPAA Complaince
HIPAA Complaince
 
Tiffany hall mha 690 week 1 discussion 2
Tiffany hall mha 690 week 1   discussion 2Tiffany hall mha 690 week 1   discussion 2
Tiffany hall mha 690 week 1 discussion 2
 
Tiffany hall mha 690 week 1 discussion 2
Tiffany hall mha 690 week 1   discussion 2Tiffany hall mha 690 week 1   discussion 2
Tiffany hall mha 690 week 1 discussion 2
 
Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)
 

Mehr von John Wible

Birth.good.birth.evil.xmas.2019.print.copy.final
Birth.good.birth.evil.xmas.2019.print.copy.finalBirth.good.birth.evil.xmas.2019.print.copy.final
Birth.good.birth.evil.xmas.2019.print.copy.finalJohn Wible
 
Dante.slideshare.final
Dante.slideshare.finalDante.slideshare.final
Dante.slideshare.finalJohn Wible
 
Paul.lesson.12.political.groups.part.3
Paul.lesson.12.political.groups.part.3Paul.lesson.12.political.groups.part.3
Paul.lesson.12.political.groups.part.3John Wible
 
Paul.lesson.11.political.groups.part.2
Paul.lesson.11.political.groups.part.2Paul.lesson.11.political.groups.part.2
Paul.lesson.11.political.groups.part.2John Wible
 
Paul.lesson.10.political.groups.second.temple.judaism
Paul.lesson.10.political.groups.second.temple.judaismPaul.lesson.10.political.groups.second.temple.judaism
Paul.lesson.10.political.groups.second.temple.judaismJohn Wible
 
Paul.lesson 10.11.12.political groups.second temple judaism
Paul.lesson 10.11.12.political groups.second temple judaismPaul.lesson 10.11.12.political groups.second temple judaism
Paul.lesson 10.11.12.political groups.second temple judaismJohn Wible
 
Paul.lesson.9.second.temple.judaism
Paul.lesson.9.second.temple.judaismPaul.lesson.9.second.temple.judaism
Paul.lesson.9.second.temple.judaismJohn Wible
 
Paul.lesson 9.second temple judaism
Paul.lesson 9.second temple judaismPaul.lesson 9.second temple judaism
Paul.lesson 9.second temple judaismJohn Wible
 
Paul.lesson.8.interim.summary
Paul.lesson.8.interim.summaryPaul.lesson.8.interim.summary
Paul.lesson.8.interim.summaryJohn Wible
 
Paul.lesson.7.pauls.day
Paul.lesson.7.pauls.dayPaul.lesson.7.pauls.day
Paul.lesson.7.pauls.dayJohn Wible
 
Paul.lesson.7.rome.greek
Paul.lesson.7.rome.greekPaul.lesson.7.rome.greek
Paul.lesson.7.rome.greekJohn Wible
 
Paul.lesson.6.post.exilic.persians
Paul.lesson.6.post.exilic.persiansPaul.lesson.6.post.exilic.persians
Paul.lesson.6.post.exilic.persiansJohn Wible
 
Paul.lesson.6.post.exilic.teacher
Paul.lesson.6.post.exilic.teacherPaul.lesson.6.post.exilic.teacher
Paul.lesson.6.post.exilic.teacherJohn Wible
 
Paul.lesson.5.babylonian.captivity.teacher
Paul.lesson.5.babylonian.captivity.teacherPaul.lesson.5.babylonian.captivity.teacher
Paul.lesson.5.babylonian.captivity.teacherJohn Wible
 
Paul.lesson.5.babylonian.captivity
Paul.lesson.5.babylonian.captivityPaul.lesson.5.babylonian.captivity
Paul.lesson.5.babylonian.captivityJohn Wible
 
Paul.lesson.4.greek.part.2
Paul.lesson.4.greek.part.2Paul.lesson.4.greek.part.2
Paul.lesson.4.greek.part.2John Wible
 
Paul.lesson.4.greek.part.2
Paul.lesson.4.greek.part.2Paul.lesson.4.greek.part.2
Paul.lesson.4.greek.part.2John Wible
 

Mehr von John Wible (20)

Birth.good.birth.evil.xmas.2019.print.copy.final
Birth.good.birth.evil.xmas.2019.print.copy.finalBirth.good.birth.evil.xmas.2019.print.copy.final
Birth.good.birth.evil.xmas.2019.print.copy.final
 
Dante.slideshare.final
Dante.slideshare.finalDante.slideshare.final
Dante.slideshare.final
 
Paul.lesson.12.political.groups.part.3
Paul.lesson.12.political.groups.part.3Paul.lesson.12.political.groups.part.3
Paul.lesson.12.political.groups.part.3
 
Paul.lesson.11.political.groups.part.2
Paul.lesson.11.political.groups.part.2Paul.lesson.11.political.groups.part.2
Paul.lesson.11.political.groups.part.2
 
Paul.lesson.10.political.groups.second.temple.judaism
Paul.lesson.10.political.groups.second.temple.judaismPaul.lesson.10.political.groups.second.temple.judaism
Paul.lesson.10.political.groups.second.temple.judaism
 
Paul.lesson 10.11.12.political groups.second temple judaism
Paul.lesson 10.11.12.political groups.second temple judaismPaul.lesson 10.11.12.political groups.second temple judaism
Paul.lesson 10.11.12.political groups.second temple judaism
 
Paul.lesson.9.second.temple.judaism
Paul.lesson.9.second.temple.judaismPaul.lesson.9.second.temple.judaism
Paul.lesson.9.second.temple.judaism
 
Paul.lesson 9.second temple judaism
Paul.lesson 9.second temple judaismPaul.lesson 9.second temple judaism
Paul.lesson 9.second temple judaism
 
Paul.lesson.8.interim.summary
Paul.lesson.8.interim.summaryPaul.lesson.8.interim.summary
Paul.lesson.8.interim.summary
 
Paul.lesson.7.pauls.day
Paul.lesson.7.pauls.dayPaul.lesson.7.pauls.day
Paul.lesson.7.pauls.day
 
Paul.lesson.7.rome.greek
Paul.lesson.7.rome.greekPaul.lesson.7.rome.greek
Paul.lesson.7.rome.greek
 
Paul.lesson.6.post.exilic.persians
Paul.lesson.6.post.exilic.persiansPaul.lesson.6.post.exilic.persians
Paul.lesson.6.post.exilic.persians
 
Paul.lesson.6.post.exilic.teacher
Paul.lesson.6.post.exilic.teacherPaul.lesson.6.post.exilic.teacher
Paul.lesson.6.post.exilic.teacher
 
Paul.lesson.5.babylonian.captivity.teacher
Paul.lesson.5.babylonian.captivity.teacherPaul.lesson.5.babylonian.captivity.teacher
Paul.lesson.5.babylonian.captivity.teacher
 
Paul.lesson.5.babylonian.captivity
Paul.lesson.5.babylonian.captivityPaul.lesson.5.babylonian.captivity
Paul.lesson.5.babylonian.captivity
 
Paul.lesson.4.greek.part.2
Paul.lesson.4.greek.part.2Paul.lesson.4.greek.part.2
Paul.lesson.4.greek.part.2
 
Paul.lesson.4.greek.part.2
Paul.lesson.4.greek.part.2Paul.lesson.4.greek.part.2
Paul.lesson.4.greek.part.2
 
Dr.gorgas
Dr.gorgasDr.gorgas
Dr.gorgas
 
Police.power
Police.powerPolice.power
Police.power
 
Dr.snows.pump
Dr.snows.pumpDr.snows.pump
Dr.snows.pump
 

Kürzlich hochgeladen

Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfOnline Income Engine
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Roland Driesen
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis Gagné
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 

Kürzlich hochgeladen (20)

Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdf
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 

Hipaa.uo a

  • 1. To HIPAA and Beyond The Law of Confidentiality and Security December, 2010 By John R. Wible, General Counsel Alabama Department of Public Health ADPH, 2010
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.

Hinweis der Redaktion

  1. Substantiates proof of services Provides continuity of care Documentation must be objective facts, not opinions
  2. If it ain’t wrote down . . . it didn’t happen! The way it is wrote down is the way it happened regardless of the way it happened
  3. All patient information is strictly confidential. See Department policy: Employee Handbook 10-02 It is the policy of the Alabama Department of Public Health (Department) to maintain strict confidentiality of personal information, written or unwritten, such as medical, financial and demographic information (e.g., addresses, social security numbers, telephone numbers, etc.) given to a Public Health employee in any discipline. Information can be released to individuals outside the Department’s system of care only upon the written consent of the individual client, or parent/guardian as applicable, or as otherwise provided by law. Employees of the Department who handle personal information are required to uphold the individual’s right to privacy. Individual employees may be held personally liable for any adverse consequences to the client or inappropriate release of information or breaches of confidentiality. Any proven violation of confidentiality will not be tolerated and is grounds for disciplinary action up to and including termination of employment and/or legal action. Furthermore, employees are protected from any discrimination, harassment or retaliation for the reporting of a violation of this policy. PROCEDURES Employees authorized to have access to confidential information must treat the information as Departmental property for which they are personally responsible. Confidential information may be discussed within the Department as minimally necessary. Employees are prohibited from attempting to obtain confidential information for which they have not received authorization. All suspected breaches of confidentiality must be reported immediately by telephone through the appropriate supervisory chain to the Privacy Officer in the Office of General Counsel. The Privacy Officer in conjunction with the Office of Personnel and Staff Development will determine the appropriate response. An ARIA Form regarding any suspected breach of confidentiality must be filed in. Some Bad Scenarios. Dr’s ofc. Clerk Hospital nurse and HIV and boyfriend. Bad scenarios equal bad liability. We’ll see more about penalties. Later.
  4. Conditions for release of information Prior written consent of patient, parent/guardian. Subpoena in accordance with departmental policy Otherwise provided by law Note: with a signed release, we can release any records, even STD/HIV/AIDS with certain exceptions
  5. Notifiable disease information is not subject to inspection, subpoena, admission into evidence in any court except by the health department to compel the testing, examination, commitment or quarantine of an individual. Code of Ala. 1975, § 22-11A-2 Request for notifiable disease medical record should be forwarded to the legal office for resolution. Call 334.206.5209. See Policy No. 2004-02 for specifics.
  6.     Disease Control has new guidelines on when and how information is released The determination regarding release of epidemiologic documents will rest with the Bureau Chief in coordination and consultation with the Office of General Counsel. The following information is not confidential , is considered to be public records, and may be released upon subpoena or other written request: Final completed report written in blank, not identifying any persons whether sick patrons or employees in conventional form. The name of businesses, establishments, restaurants involved in an investigation. Aggregate statistical information (e.g., number of cases of reportable conditions/diseases and outbreaks of public health significance). Any other public document such as press clippings and internet postings. Regular environmental inspection reports and daycare reports made in the normal course of business such as periodic inspections and notices of violation.
  7. The following information, whether retained as documents or by electronic means, is confidential and not considered to be public record but may be released pursuant to a lawful HIPAA compliant subpoena if personal health information (PHI) is redacted. PHI includes, but is not limited to name, address, telephone numbers, social security numbers, workplace. epidemiologic interview sheets any information provided by a medical provider, lab, school authority or other required reporting entity work papers, notes and analyses disclosure of actual numbers of cases, sample sizes or any other description or numeric value which has the potential to identify any person Correspondence including on a particular investigation Complaint generated environmental and other inspection reports incomplete drafts of reports Other document received privately
  8. The following information is confidential but may be released only pursuant to a valid authorization from a patient/client: A notifiable disease record generated by the Department or in the possession of the Department (such as electronic laboratory reports or facsimile lab reports) that concerns the symptoms, condition or other information specific to an individual. One patient’s authorization, however does not release other person’s names or information
  9. Written consent not required for transfer of information from one county health department to another or to the state office, transfer of information to physicians, nurse practitioners or other health professionals who have a contract or other provider arrangements to provide care to our patients. Some practitioners require consents to transfer out of abundance of caution, we do not.
  10. A Valid authorization contains: Description of the info to be released Name or description of info receiver Name of patient Description if the use of the info Expiration date or continuous Right of revocation by pt. Notice of possible re-disclosures Signature of pt or representative See CHR Form 6A and instructions
  11. CHR 6A states that pt. is made aware that s/he is releasing STD/HIV/AIDS or drug and alcohol treatment or mental health records This is NOT required if other providers’ releases meet the earlier criteria
  12. The “medical record” or information regarding notifiable diseases cannot be released without the written consent of the patient or the parent/guardian. Even with consent, the “medical record” should not include contact information. If your patient has an STD or HIV, record medical condition in your documentation. Do not write identifying information about how the patient contracted the STD/HIV .
  13. If a minor is legally qualified to consent for services and in fact signs the “consent for treatment”, only the minor can sign to release the medical information regarding those services. If the parent/guardian signs the consent for treatment, the parent/guardian or the minor may consent for the release of medical records.
  14. Alabama statue provides that all information, including medical records, pertaining to a child must be equally available to both parents in all types of custody arrangements unless otherwise ordered by a court of law. Code of Ala , § 30-3-154 If the parent or guardian gave consent for medical services, then the parent or guardian of the minor is generally entitled to his or her child’s medical record. This information would also be available to the other parent. If the child gave consent for services, neither parent may have access to the records without that child’s consent.
  15. HIPAA stands for The Health Insurance Portability and Accountability Act The Health Insurance Portability and Accountability Act ( HIPAA ) 1 was passed on August 21, 1996. Among other things, it included rules covering administrative simplification , including making healthcare delivery more efficient. Portability of medical coverage for pre-existing conditions was a key provision of the act as was defining the underwriting process for group medical coverage. It also provided standardization of electronic transmittal of billing and claims information. Congress recognized that standardizing the electronic means of paying and collecting claims data increased the potential for abuse of people's medical information. So a key part of the act also increased and standardized confidentiality and security of health data. HIPAA privacy regulations require that access to patient information be limited to only those authorized, and that only the information necessary for a task be available to them. And finally that personal health information must be protected and kept confidential. Amended by “ARRA,” or “HITEC”, the American Recovery and Reinvestment Act of 2009 and it includes as one component the Health Information Technology for Economic and Clinical Health (HITECH) Act which authorizes $36 billion of funding to put in place an electronic health information technology (HIT) infrastructure.
  16. Patient name Patient address Patient phone number Patient date of birth Patient social security number, Medicaid number, etc Diagnosis Treatment information Financial information
  17. What is covered? “ Protected Health Information” (PHI): Individually-identifiable health information used or disclosed by a covered entity in any form, whether electronically, on paper, or orally 45 C.F.R. §160.103 ADPH is a covered entity. Who is covered? Health care providers that conduct certain electronic transactions, i.e.. billing or hybrid entities ( like ADPH ) Health care plans Health care clearinghouses 45 C.F.R. §160.103
  18. You can use protected health information (PHI) without the patient’s authorization for: Treatment - provision, coordination or management of health care and related services Payment - includes the various activities of health care providers to obtain payment or be reimbursed for their services Operations – administrative, financial, legal, and quality improvement activities that are necessary to support the core functions of treatment and payment Where required by law
  19. Business associates of CEs are bound by contract with the CE and new amendments to follow the same level of protection in the privacy rule and include: Claims or data processors; billing companies; Quality assurance providers; lawyers; Utilization reviewers; accountants and Financial service providers 45 C.F.R. §160.103
  20. Business Associates of Covered Entities must now adhere to the Security Rule like covered entities They must establish administrative, physical, and technical safeguards for Protected Health Information (PHI) They must have their own policies and procedures to comply with the safeguards Business Associates now have an affirmative duty to ensure they are only using or disclosing PHI in accordance with HIPAA. Violation for knowing of a pattern of activity or practice by the CE that would constitute a violation and not reporting to HHS Same types of penalties and criminal sanctions as CEs for HIPAA violations Rat Fink provisions – they must turn in their principals.
  21. Entities not covered: Life insurance companies Auto insurance companies Workers’ compensation carriers Employers Others who acquire, use, and disclose vast quantities of health data, However, PHI cannot be bought and sold.
  22. PHI does not include Education records covered by FERPA Employment records held by a covered entity in its role as employer Non-identifiable health information 45 C.F.R. 160.103
  23. HIPAA -What it Doesn’t Do State laws stay in force Only limited encryption of communications No requirement of major facility restructuring Incidental disclosures not totally eliminated Reporting not changed Relationships not changed
  24. Under HIPAA You can use protected health information (PHI) without the patient’s authorization for: Treatment - provision, coordination or management of health care and related services; Payment - includes the various activities of health care providers to obtain payment or be reimbursed for their services; Operations – administrative, financial, legal, and quality improvement activities that are necessary to support the core functions of treatment and payment; and where required by law. See ADPH HIPAA Privacy Policy 06-008 which discusses the “Minimum Necessary” Concept, patient verification requirements, fax Confidentiality, the “HIPAA Log”, and breach sanctions. The Policy needs updating, as it refers to policies subsumed in the Employee Handbook. See CHR Manual and New Employee Handbook 2010-02 as well.
  25. The “Minimum Necessary Rule” When using or disclosing PHI, a covered entity must make reasonable efforts to limit such information to the minimum necessary to accomplish the intended purpose of the use, disclosure, or request. Under HITEC, OIG is supposed to promulgate guidance on what they think the “minimum necessary” is – I can’t wait.
  26. Permitted disclosures” Disclosure of PHI to “public officials” to lessen the effects of the emergency To law enforcement for their necessary activities. We’ll see more later To national security and intelligence agencies To Public Health authorities To judicial authorities To Researchers To DHR for limited purposes Whatever we disclose, Covered Entities and their Business Associates should not use or disclose PHI beyond what is reasonably necessary for the purpose of the use or disclosure
  27. The law enforcement purposes for which PHI may be released without authorization are: Pursuant to process and as otherwise required by law. 45 CFR §164.512(f)(1) For identification and location purposes (limited information only). 45 CFR §164.512(f)(2) In response to request for such information about an individual who is or is suspected to be a victim of a crime. 45 CFR §164.512(f)(3) For purpose of alerting law enforcement official about a suspicious death. 45 CFR §164.512(f)(4) For purpose of reporting evidence of criminal conduct occurring on premises of covered entity. 45 CFR §164.512(f)(5). An provider who is providing care in response to a medical emergency my alert law enforcement regarding information pertaining to crime. 45 CFR §164.512(f) (1) May use or disclose PHI if the use or disclosure: (i)(A) Is necessary to prevent or lessen a serious and imminent threat to the health or safety of a person or the public; and (B) Is to a person or persons reasonably able to prevent or lessen the threat, including the target of the threat; or Is necessary for law enforcement authorities to identify or apprehend an individual
  28. CEs may disclose PHI to authorized federal officials for the conduct of intelligence, counter-intelligence, and other national security activities. If it is national security, we disclose any information they need. It is not subject to the law enforcement limitations.
  29. Disclosures to Public Health The public health exception allows a covered entity to disclose PHI without individual authorization to a “public health authority that is authorized by law to collect and receive such information for the purpose of preventing and … controlling disease, injury, or disability, including… reporting of disease… and the conduct of public health surveillance….”
  30. Examples of specific public health-based exceptions include disclosures About victims of abuse, neglect, or domestic violence To prevent serious threats to persons or the public.
  31. Information on decedents may be released to Law enforcement Transporting emergency medical personnel Coroners and their personnel Mortuary personnel Bureau of Health Statistics But, just because they are dead does not remove the general protection of the record.
  32. CEs must maintain all documentation (e.g., policies, procedures) required by the Security Rule for a period of six years from the date of its creation or the date when it last was in effect, whichever is later. Such documentation must be made available to the workforce members responsible for implementing the policies and procedures. Additionally, CEs must periodically review such documentation and revise and update it as needed to ensure the confidentiality, integrity, and availability of EPHI.
  33. The rule applies to electronic protected health information (EPHI) , which is individually identifiable health information (IIHI) in electronic form. IIHI relates to 1) an individual's past, present, or future physical or mental health or condition, 2) an individual's provision of health care, or 3) past, present, or future payment for provision of health care to an individual. The primary objective of the Security Rule is to protect the confidentiality, integrity, and availability of EPHI when it is stored, maintained, or transmitted.
  34. Same as PHI, but created, received, or maintained electronically. Does not include telephone calls, copy machines, fax machines, most voice mail. Does not include de-identified information.
  35. HIPAA Security Rule HIPAA requires security of the premises, i.e., door locks. Watch out for strange people who don’t need to be there. HIPAA also requires security of the electronic records (computer security). Information should be password protected. Don’t share your password with anyone except IT staff. Put computers where outsiders can’t see them. Screen savers must be used and should be on a short delay. Always lock out computer when you walk away from it. Never leave anyone in the room when you leave without the lockout. Be careful about your computer, don’t get it infected with a virus or spy ware. Don’t visit strange websites, don’t download off the internet. Run an anti virus program frequently if you don’t have IT staff to do this. If information stays within the facility need not be encrypted. But if you take it outside either sending an E-mail or on a laptop, disk or thumb drive, such info should be encrypted using an encryption program. HIPAA requires security of the paper. It should be locked when not needed and not left lying around. Name badges might be a good idea to help tell who is supposed to be there. ADPH requires them, but HIPAA does not per se.
  36. Post the Department’s Notice of Privacy Practices where clients can see it Maintain visitor sign-in logs and have visitors sign in and out (this includes repair persons) Use ADPH and Visitor ID badges always when at work. Keep back doors locked or monitored during business hours Keep server rooms locked Keep PHI storage areas locked when unattended
  37. Clean Desk Keep patient records covered or in folders Lock records up at end of day or when away from desk Fax/Copy Machines Put fax & copiers in secure area away from traffic flow Remove faxes/copies promptly File Cabinets Keep locked when unattended Locate in secure area Limit access Shred it!
  38. Only use Department furnished equipment and software. (Security Manual, lILC. Workstation and State Electronic Equipment Use Policy) CSC/Tech Support will purchase and install all network-connected devices. (Security Manual, lIl.C. Workstation and State Electronic Equipment Use Policy) All personal computers and laptops will have password protection and will have an automatic screensaver, which will activate after 15 minutes or less of unattended use. (Security Manual, lILC. Workstation and State Electronic Equipment Use Policy) CSC/Tech Support will install software updates for security and antivirus weekly onpersonal computers. (Security Manual, II.F.2 Protection from Malicious Software) Users will connect laptops to the network at least once a month, log into the master database, and receive updates for security and antivirus software. (Security Manual, III.D. Workstation Security Policy) Users will back up critical data or e-PHI stored on their personal computer or laptop to their assigned folder on the server. Users do not need to back up data created and stored in an enterprise information system such as PHALCON, McKesson, or ACORN, because CSC/Tech Support automatically performs backups of these systems. (Security Manual, lILE.4. Data Backup and Storage)
  39. The Department will require password changes every sixty days. Users will create a new password when prompted and will keep passwords secured. (Security Manual, ILFA. Password Management) Users will not use equipment for unlawful activities, distributing pornography, gambling, offensive/harassing messages and images. Supervisors will be responsiblefor monitoring employees' usage through observation and will handle violations in accordance with Department disciplinary procedures. (Security Manual, IlLC. Workstation and State Electronic Equipment Use Policy) Users should report suspected security violations, virus attacks, cyber criminal attacks, or physical compromises to CSC Support Desk immediately. (Il.G.l Security Incident Response and Reporting) Contact the help desk at 334-206-5268 to report. When an employee begins work and requires a computer and access to information systems, the bureau/office/local administrator will notifY the CSC Support Desk. (Security Manual, Il.E.2. Access Authorization) When an employee leaves the Department or transfers to a new office, the bureau/office/local administrator will notifY the CSC Support Desk and complete a Computer Access Removal Form. (Security Manual, ILE.2. Access Authorization) When salvaging or transferring computer/electronic equipment, the Department must remove all sensitive or e-PHI from the device. To do that, the officelbureau will salvage the item using the Department equipment salvage procedures. CSC will properly destroy the memory storage components in the equipment. (Security Manual, ILE.l. Device and Media Disposal and III.E.2. Media Re-use) ADPH facilities must be limited to authorized users and safeguarded from unauthorized access, tampering, and theft. Each officelbureau will have procedures for physical security to include locking, key control, electronic device and media protection, employee identification badges, and visitor logs. (IlLB.2. Facility Security Plan and Security Manual, IlLB.3. Physical Access Control and Validation Procedures) Be careful with portable storage devices
  40. Safe to email within ADPH Notes system. Email to outside sources should encrypt protected information. Email Do not open email from an unknown source; especially unknown attachments Verify email recipients; make sure email is going to intended recipient Always encrypt email and attachments containing protected information Read security reminders Avoid risky internet sites
  41. Keep laptop out of view when traveling Do not leave in hot vehicle for long time Do not check with luggage when flying Password protect Set screen saver to require password Log on to network once a month to update virus protection software Encrypt protected information
  42. Patients may ask for a listing of disclosures we have made of their PHI for up to six (6) years prior to the request in paper or electronic form (not including disclosures made prior to April 14, 2003). The following disclosures are NOT required to be accounted for: T reatment, P ayment, Healthcare O perations (TPO) Disclosures authorized by the patient or authorized representative Disclosures to the patient or persons involved with their care
  43. Other disclosures which are not required to be accounted for: National security or intelligence purposes Correctional institutions or law enforcement officials having lawful custody of an inmate Incidental disclosures Limited Data Sets used for research purposes An accounting is required for disclosures of which the patient may not be aware, e.g., those which are required by law (such as abuse or communicable diseases) or accidental disclosures. Accidental disclosures should also be reported to your Privacy Officer. If we have it in electronic form, we may be required to give it in electronic form. If we have it in electronic form, we may be required to give it in electronic form.
  44. The HIPAA Log is a single file which relates to pt. files. It is kept with medical records. You should document the following “non-routine” disclosures. The information that must be documented for each disclosure is: the date of the disclosure; the name of the entity or person who received the PHI and, if known, the address and contact information; a brief description of the PHI disclosed (e.g., records for visit on June 7, 2003, all radiology reports related to broken wrist, etc.); and a brief statement of the purpose of the disclosure that reasonably informs the patient of the basis for the disclosure.
  45. Required Logged Items Unauthorized releases on the AIR Form, soon to be the ARI/A E-form Releases required by law Releases based upon subpoena Releases to law enforcement for ID Requests to limit releases Requests to amend or correct PHI Requests by the patient for accounting Reports about victims of abuse, neglect, or domestic violence
  46. DISCLOSURES NOT REQUIRED TO BE LOGGED: made to carry out treatment, payment, or healthcare operations; made to the patient; made pursuant to a valid and effective authorization (one that complies with the requirements of state law as well as with the HIPAA Privacy Regulations) signed by the patient; made to persons involved in the patient's care or other notification and location purposes; to federal officials for national security or intelligence purposes; to a correctional institution or law enforcement official that has custody of a patient; that are part of a limited data set; and to a health oversight or law enforcement official
  47. When there is a breach of phi or e-PHI , You have a duty to report on an ARIA Call if it is serious! When complaints or notice of breaches are received by privacy officer, the agency has a duty to: Investigate - Mitigate, Resolve, Respond, Document activities relating to the investigation, mitigation and response in HIPAA Log. Notification – we might have to notify the patient that his or her information has been compromised. Reporting - No report to HHS is required, though the process is subject to compliance audit. Remediation -The agency’s response may require amendment of privacy policies and procedures. Discipline - Response may require employee sanctions for employee breaches. HHS will look on an audit to see if this was followed up. See 45 CFR § 164.530(e-g). ADPH defines this in Policy 03-03. Criminal Penalties - A person’s knowing use or disclosure of PHI in violation of HIPAA may result in criminal penalties of up to $50,000 in fines and one year in prison. Uses or disclosures made under false pretenses may result in criminal penalties of up to $100,000 in fines and 5 years in prison. HIPAA Privacy Rule violations committed with intent to sell, transfer or use PHI for commercial or personal gain or malicious harm are punishable by a fine not to exceed $250,000 and/or 10 years in prison. A recent case in the Northwest has a hospital employee in big trouble. Civil Causes of Action - A violation of the HIPAA Privacy Rule creates a civil cause of action It also may create a civil cause of action. Furthermore, a failure to follow HIPAA privacy procedures may become the “standard of care” in common law breach of privacy actions under state law.
  48. Breach may subject employees and the CE: To criminal penalties (up to $250,000); you are not covered by the Fund. To HHS civil penalties or lawsuits To adverse employment action, IE.,
  49. The HIPAA program and certain other similar programs are under the management of the Risk Management Committee composed of the Privacy Officer, Security Officer, Code Specialist and other senior personnel Committee proposes HIPAA policy changes Committee receives and processes all accident/incident reports including possible HIPAA breaches The Committee oversees Red Flags instances
  50. Federal Trade Commission Regulations designed to protect against identity theft As a “creditor”, ADPH has “covered transactions” with clients/patients ADHP has a duty to be on the lookout for certain red flags Develop a written program that identifies and detects “red flags” of identity theft Describe appropriate responses that would prevent and mitigate the crime and detail a plan to update the program. Be managed by the Board of Directors or senior employees Include appropriate staff training, and Provide for oversight of any service providers.
  51. Categories of Red Flags: Alerts, notifications, or warnings from a consumer reporting agency; Suspicious documents; Suspicious personally identifying information, such as a suspicious address; Unusual use of – or suspicious activity relating to – a covered account; and Notices from customers, victims, law enforcement authorities, or businesses about possible identity theft
  52. See also: 98-07 Fax Policy 03-10 Notice of Privacy Practices (NOPP) Sub revision 03-30 Vital Records Policies 04-02 Receipt of Legal Documents 05-16 HIPAA Security Policy/Manual 06-08 HIPAA Privacy Policy 10-04 Contract Employee Handbook ARIA E-Form