SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Health Insurance Portability and
Accountability Act of 1996 (HIPAA)
   Privacy and Security Rules



           Summary
      The Healthcare Team
TRAINING &
       AWARENESS
1. Introduction to HIPAA
2. PHI Identifiers and Awareness
3. Security Measures
4. Privacy Breaches
5. Policies & Procedures
What is HIPAA?
The Health Insurance Portability and
Accountability Act (HIPAA) is a federal law
that specifies administrative simplification
provisions that:
1. Protect the privacy of patient information
2. Provide for electronic and physical security
   of patient health information
3. Require “minimum necessary” use and
   disclosure
4. Specify patient rights to approve the access
   and use of their medical information
Protected Health
       Information (PHI)
PHI is any information about health
status, provision of health care, or
payment for health care that can be linked
to a specific individual
Protected Health Information (PHI)
            18 Identifiers
Name                                Account numbers

Postal address                      License numbers

All elements of dates except year   Health plan beneficiary number

Telephone number                    Medical record number
Fax number                          Device identifiers and their serial
                                    numbers
Email address                       Vehicle identifiers and serial
                                    numbers
URL address                         Biometric identifiers
IP address                          Full face photos and other
                                    comparable images
Social security number              Any other unique identifying number,
                                    code, or characteristic
When should you use PHI?

1. Only when necessary to perform your
  job duties

2. Use only the minimum necessary to
  perform your job duties
How do I secure PHI?
• Use electronic data only in a firewall
  environment (cloud)
• Do not download to a non-protected
  environment:
  •   Laptop
  •   Flashdrive
• Do not verbally release PHI outside the
  office
• Do not leave PHI on answering machines
• Ensure all paper, cds, and records are
  locked up or destroyed
Privacy Breaches
• Talking in public areas too loudly or to the
    wrong person
•   Lost/stolen or improperly disposed of paper,
    mail, films, notebooks
•   Lost/stolen laptops, PDAs, cell phones, media
    devices (video/audio recordings)
•   Lost/stolen zip disks, CDs, flash drives
•   Hacking or unprotected computer systems
•   Email/faxes sent to the wrong address, wrong
    person, or wrong number
•   User not logging off of their computer system
    allowing others to access
Notice of Privacy Practices
               (NOPP)
The Notice of Privacy Practices allows PHI to
be used and disclosed for purposes of TPO:
    Treatment
    Payment
    Operations

TPO includes teaching, medical staff/peer
review, legal, auditing, customer service,
business management, and releases mandated
by law
Remember
All patient information is private
• Personal information
• Financial information
• Medical information
• Protected Health Information
• Information in any format:
  •   Spoken
  •   Written
  •   Electronic

Weitere ähnliche Inhalte

Was ist angesagt?

Welcome to HIPAA Training
Welcome to HIPAA TrainingWelcome to HIPAA Training
Welcome to HIPAA Training
Jonathan Montes
 
HIPPA Compliance
HIPPA ComplianceHIPPA Compliance
HIPPA Compliance
dixibee
 

Was ist angesagt? (20)

General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...
 
All about a DPIA by Andrey Prozorov 2.0, 220518.pdf
All about a DPIA by Andrey Prozorov 2.0, 220518.pdfAll about a DPIA by Andrey Prozorov 2.0, 220518.pdf
All about a DPIA by Andrey Prozorov 2.0, 220518.pdf
 
DPIA
DPIADPIA
DPIA
 
Welcome to HIPAA Training
Welcome to HIPAA TrainingWelcome to HIPAA Training
Welcome to HIPAA Training
 
Data Privacy & Security
Data Privacy & SecurityData Privacy & Security
Data Privacy & Security
 
Patient Privacy and Safety in Healthcare
Patient Privacy and Safety in HealthcarePatient Privacy and Safety in Healthcare
Patient Privacy and Safety in Healthcare
 
office365-exchange-online-protection
office365-exchange-online-protection office365-exchange-online-protection
office365-exchange-online-protection
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
 
GDPR Presentation slides
GDPR Presentation slidesGDPR Presentation slides
GDPR Presentation slides
 
Data protection ppt
Data protection pptData protection ppt
Data protection ppt
 
Introduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityIntroduction to Data Protection and Information Security
Introduction to Data Protection and Information Security
 
General Data Protection Regulation
General Data Protection RegulationGeneral Data Protection Regulation
General Data Protection Regulation
 
Hipaa training
Hipaa trainingHipaa training
Hipaa training
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation
 
GDPR Overview
GDPR OverviewGDPR Overview
GDPR Overview
 
Deep dive into Microsoft Purview Data Loss Prevention
Deep dive into Microsoft Purview Data Loss PreventionDeep dive into Microsoft Purview Data Loss Prevention
Deep dive into Microsoft Purview Data Loss Prevention
 
Applying the Personal Data Protection Act (Singapore)
Applying the Personal Data Protection Act (Singapore)Applying the Personal Data Protection Act (Singapore)
Applying the Personal Data Protection Act (Singapore)
 
HIPPA Compliance
HIPPA ComplianceHIPPA Compliance
HIPPA Compliance
 
Microsoft Azure Information Protection
Microsoft Azure Information Protection Microsoft Azure Information Protection
Microsoft Azure Information Protection
 
GDPR Data Subject Rights - What You Need to Know
GDPR Data Subject Rights - What You Need to KnowGDPR Data Subject Rights - What You Need to Know
GDPR Data Subject Rights - What You Need to Know
 

Andere mochten auch

HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA Basics
Karna *
 
Hipaa101 updated
Hipaa101 updatedHipaa101 updated
Hipaa101 updated
kkurapat
 
Hippa slide show
Hippa slide showHippa slide show
Hippa slide show
heathercool
 
Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)
bholmes
 
HIPAA Training by Greater Baltimore Medical Center
HIPAA Training by Greater Baltimore Medical CenterHIPAA Training by Greater Baltimore Medical Center
HIPAA Training by Greater Baltimore Medical Center
Atlantic Training, LLC.
 

Andere mochten auch (11)

HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA Basics
 
Hipaa101 updated
Hipaa101 updatedHipaa101 updated
Hipaa101 updated
 
HIPAA Training: Preventing Employees from Violating HIPAA
HIPAA Training: Preventing Employees from Violating HIPAAHIPAA Training: Preventing Employees from Violating HIPAA
HIPAA Training: Preventing Employees from Violating HIPAA
 
Hippa slide show
Hippa slide showHippa slide show
Hippa slide show
 
HIPAA Training - 2011
HIPAA Training - 2011HIPAA Training - 2011
HIPAA Training - 2011
 
HIPAA - Understanding the Basics of Compliance
HIPAA - Understanding the Basics of ComplianceHIPAA - Understanding the Basics of Compliance
HIPAA - Understanding the Basics of Compliance
 
HIPAA
HIPAAHIPAA
HIPAA
 
HIPAA and How it Applies to You
HIPAA and How it Applies to YouHIPAA and How it Applies to You
HIPAA and How it Applies to You
 
Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)
 
HIPAA Training by Greater Baltimore Medical Center
HIPAA Training by Greater Baltimore Medical CenterHIPAA Training by Greater Baltimore Medical Center
HIPAA Training by Greater Baltimore Medical Center
 
HIPAA Audio Presentation
HIPAA  Audio PresentationHIPAA  Audio Presentation
HIPAA Audio Presentation
 

Ähnlich wie HIPAA Summary for Training

Hipaa education
Hipaa educationHipaa education
Hipaa education
eklundc
 
Hipaa training new_staff_december 2018 - compatibility mode
Hipaa training new_staff_december 2018  -  compatibility modeHipaa training new_staff_december 2018  -  compatibility mode
Hipaa training new_staff_december 2018 - compatibility mode
robint2125
 
Hipaa basics pp2
Hipaa basics pp2Hipaa basics pp2
Hipaa basics pp2
martykoepke
 
Wk1 discussion 2
Wk1 discussion 2Wk1 discussion 2
Wk1 discussion 2
jodimw
 
Upholding confidentiality
Upholding confidentialityUpholding confidentiality
Upholding confidentiality
Theresa Tapley
 
Ethical & Legal Issues for Health IT in Thailand's Context
Ethical & Legal Issues for Health IT in Thailand's ContextEthical & Legal Issues for Health IT in Thailand's Context
Ethical & Legal Issues for Health IT in Thailand's Context
Nawanan Theera-Ampornpunt
 
Confidentiality Awareness
Confidentiality AwarenessConfidentiality Awareness
Confidentiality Awareness
itchomecare
 
Hippa and Confidentiality
Hippa and ConfidentialityHippa and Confidentiality
Hippa and Confidentiality
ramonapage
 

Ähnlich wie HIPAA Summary for Training (20)

Basic HIPAA Training by CMU
Basic HIPAA Training by CMUBasic HIPAA Training by CMU
Basic HIPAA Training by CMU
 
Hipaa education
Hipaa educationHipaa education
Hipaa education
 
Hipaa overview 073118
Hipaa overview 073118Hipaa overview 073118
Hipaa overview 073118
 
Hipaa training new_staff_december 2018 - compatibility mode
Hipaa training new_staff_december 2018  -  compatibility modeHipaa training new_staff_december 2018  -  compatibility mode
Hipaa training new_staff_december 2018 - compatibility mode
 
Hipaa basics pp2
Hipaa basics pp2Hipaa basics pp2
Hipaa basics pp2
 
Mini training.user.ba.termination.v2.0
Mini training.user.ba.termination.v2.0Mini training.user.ba.termination.v2.0
Mini training.user.ba.termination.v2.0
 
Wk1 discussion 2
Wk1 discussion 2Wk1 discussion 2
Wk1 discussion 2
 
HIPAA Training
HIPAA TrainingHIPAA Training
HIPAA Training
 
Upholding confidentiality
Upholding confidentialityUpholding confidentiality
Upholding confidentiality
 
HIPAA 2010
HIPAA  2010HIPAA  2010
HIPAA 2010
 
HIPAA Compliance For Small Practices
HIPAA Compliance For Small PracticesHIPAA Compliance For Small Practices
HIPAA Compliance For Small Practices
 
Ethical & Legal Issues for Health IT in Thailand's Context
Ethical & Legal Issues for Health IT in Thailand's ContextEthical & Legal Issues for Health IT in Thailand's Context
Ethical & Legal Issues for Health IT in Thailand's Context
 
How to avoid being caught out by HIPAA compliance?
How to avoid being caught out by HIPAA compliance?How to avoid being caught out by HIPAA compliance?
How to avoid being caught out by HIPAA compliance?
 
Are You HIPAA Safe?
Are You HIPAA Safe?Are You HIPAA Safe?
Are You HIPAA Safe?
 
Hcc_hipaa hitech training_Basic www.hcctecnologies.com
Hcc_hipaa hitech training_Basic www.hcctecnologies.comHcc_hipaa hitech training_Basic www.hcctecnologies.com
Hcc_hipaa hitech training_Basic www.hcctecnologies.com
 
Confidentiality Awareness
Confidentiality AwarenessConfidentiality Awareness
Confidentiality Awareness
 
Hippa and Confidentiality
Hippa and ConfidentialityHippa and Confidentiality
Hippa and Confidentiality
 
Hippa
HippaHippa
Hippa
 
C. Gibbs MHA 690 week 1 discussion 2
C. Gibbs MHA 690 week 1 discussion 2C. Gibbs MHA 690 week 1 discussion 2
C. Gibbs MHA 690 week 1 discussion 2
 
Tiffany hall mha 690 week 1 discussion 2
Tiffany hall mha 690 week 1   discussion 2Tiffany hall mha 690 week 1   discussion 2
Tiffany hall mha 690 week 1 discussion 2
 

Mehr von MDManagement (7)

Physician compensation
Physician compensationPhysician compensation
Physician compensation
 
PQRS - Avoiding the Penalties?
PQRS - Avoiding the Penalties?PQRS - Avoiding the Penalties?
PQRS - Avoiding the Penalties?
 
Adoption tax credit 2013
Adoption tax credit 2013Adoption tax credit 2013
Adoption tax credit 2013
 
2010 Adoption tax credit
2010 Adoption tax credit2010 Adoption tax credit
2010 Adoption tax credit
 
Show Me The Money
Show Me The MoneyShow Me The Money
Show Me The Money
 
Adoption Tax Credit
Adoption Tax CreditAdoption Tax Credit
Adoption Tax Credit
 
Simple IRA Overview
Simple IRA OverviewSimple IRA Overview
Simple IRA Overview
 

HIPAA Summary for Training

  • 1. Health Insurance Portability and Accountability Act of 1996 (HIPAA) Privacy and Security Rules Summary The Healthcare Team
  • 2. TRAINING & AWARENESS 1. Introduction to HIPAA 2. PHI Identifiers and Awareness 3. Security Measures 4. Privacy Breaches 5. Policies & Procedures
  • 3. What is HIPAA? The Health Insurance Portability and Accountability Act (HIPAA) is a federal law that specifies administrative simplification provisions that: 1. Protect the privacy of patient information 2. Provide for electronic and physical security of patient health information 3. Require “minimum necessary” use and disclosure 4. Specify patient rights to approve the access and use of their medical information
  • 4. Protected Health Information (PHI) PHI is any information about health status, provision of health care, or payment for health care that can be linked to a specific individual
  • 5. Protected Health Information (PHI) 18 Identifiers Name Account numbers Postal address License numbers All elements of dates except year Health plan beneficiary number Telephone number Medical record number Fax number Device identifiers and their serial numbers Email address Vehicle identifiers and serial numbers URL address Biometric identifiers IP address Full face photos and other comparable images Social security number Any other unique identifying number, code, or characteristic
  • 6. When should you use PHI? 1. Only when necessary to perform your job duties 2. Use only the minimum necessary to perform your job duties
  • 7. How do I secure PHI? • Use electronic data only in a firewall environment (cloud) • Do not download to a non-protected environment: • Laptop • Flashdrive • Do not verbally release PHI outside the office • Do not leave PHI on answering machines • Ensure all paper, cds, and records are locked up or destroyed
  • 8. Privacy Breaches • Talking in public areas too loudly or to the wrong person • Lost/stolen or improperly disposed of paper, mail, films, notebooks • Lost/stolen laptops, PDAs, cell phones, media devices (video/audio recordings) • Lost/stolen zip disks, CDs, flash drives • Hacking or unprotected computer systems • Email/faxes sent to the wrong address, wrong person, or wrong number • User not logging off of their computer system allowing others to access
  • 9. Notice of Privacy Practices (NOPP) The Notice of Privacy Practices allows PHI to be used and disclosed for purposes of TPO:  Treatment  Payment  Operations TPO includes teaching, medical staff/peer review, legal, auditing, customer service, business management, and releases mandated by law
  • 10. Remember All patient information is private • Personal information • Financial information • Medical information • Protected Health Information • Information in any format: • Spoken • Written • Electronic