SlideShare ist ein Scribd-Unternehmen logo
1 von 27
The Culture of Health Care
Privacy, Confidentiality, and Security
Lecture c
This material (Comp 2 Unit 9) was developed by Oregon Health & Science University, funded by the Department
of Health and Human Services, Office of the National Coordinator for Health Information Technology under
Award Number IU24OC000015. This material was updated in 2016 by Bellevue College under Award
Number 90WT0002.
This work is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International
License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc-sa/4.0/.
Privacy, Confidentiality, and Security
Learning Objectives
• Define and discern the differences between privacy,
confidentiality, and security (Lecture a).
• Discuss methods for using information technology to
protect privacy and confidentiality (Lecture b).
• Describe and apply privacy, confidentiality, and
security under the tenets of HIPAA Privacy and
Security rules (Lectures c and d).
• Discuss the intersection of a patient’s right to privacy
with the need to share and exchange patient
information (Lecture d).
3
HIPAA Privacy and Security
• 2006 HIPAA Rule
– Privacy Rule:
http://www.hhs.gov/ocr/privacy/hipaa/understanding/summary
– Security Rule: www.hhs.gov/ocr/privacy/hipaa/understanding/srsummary.html
• 2008 Genetic Information Nondiscrimination Act (GINA)
– Genetic information is protected under the HIPAA Privacy Rule
– Prohibits most health plans from using/disclosing genetic information for
underwriting purposes
– www.eeoc.gov/laws/statutes/gina.cfm
• 2009 ARRA/HITECH legislation enhanced both rules
– http://www.hhs.gov/ocr/privacy
• 2013 HIPAA Rule updated
– Strengthens privacy protections, new rights for individuals to their health
information, strengthens the government’s ability to enforce the law
– www.hhs.gov/about/news/2013/01/17/new-rule-protects-patient-privacy-secures-
health-information.html
4
HIPAA Privacy and Security
Continued
– Original rule summaries available (ID Experts,
2014; BridgeFront, 2009; Leyva, 2011)
– HHS resources such as HIPAA & Health IT
– Various HIPAA tool kits
– NIH’s research entities guides
– Employee training resources
– HIPAA certificates and training courses
– HHS’s consumer resources for the public
5
HIPAA Privacy Rule
• Applies to “covered entities” (CEs)—any entity that bills
electronically
– Health care providers
o Clinicians, hospitals, clinics, etc.
– Health plans
o HMOs, insurance companies, etc.
– Healthcare clearinghouses
o Billing services
– Business associates
• Patient must authorize any disclosure, with the exception of
“treatment, payment, or operations” (TPO); does not preclude
health care providers from sharing data for patient care, a common
misunderstanding (Houser, Houser, & Shewchuk, 2007)
6
Physician Oaths of Privacy
Are Not New
• Oath of Hippocrates, fifth century BC
– “All that may come to my knowledge in the
exercise of my profession or outside of my
profession or in daily commerce with men,
which ought not to be spread abroad, I will
keep secret and never reveal.”
• Declaration of Geneva, 20th century
– “I will respect the secrets which are confided
in me, even after the patient has died.”
AAPS, n.d.
What Is Covered?
• Protected health information (PHI)
– Collected from patient and created by covered entity
– Individually identifiable
– Electronically transmitted—in reality, all information
• Extends to covered entities and business associates
• De-identified information is not covered
• Pre-emption
– HIPAA trumps state law if state law is less protective of privacy
and security, but state laws that go beyond the HIPAA
protections are not nullified by HIPAA and must be followed
8
Identifiers Contained in Protected
Health Information (PHI)
• Name
• Address (street address, city,
county, ZIP code)
• Names of relatives
• Names of employers
• E-mail address
• Fax number
• Telephone number
• Birth date
• Finger or voice prints
• Photographic images
• Social Security number
• Internet protocol (IP) address
• Any vehicle or device serial
number
• Medical record number
• Health plan beneficiary number
• Account number
• Certificate/license number
• Web URL
• Any other unique identifying
number, characteristic, or code
9
Key Privacy Compliance Areas
• Notice of privacy practices
• Authorization
• Business associates and subcontractors
• Allowable disclosures
• Marketing
• Physician and staff training
• Penalties
10
Notice of Privacy Practices
• Patient has right to
– Adequate notice of privacy practices
– Uses and disclosures of PHI
– Description of individual rights
– Covered entities’ legal duties
• One problem is readability of Notice of Privacy Practices (NPP)
forms comparable to medical journal articles and beyond 80% of
U.S. adults (Breese & Burman, 2005)
• Physicians’ requirements for obtaining NPP consent include
– “Good faith effort” to obtain acknowledgment during first provision of in-
person service
– Failure to obtain is not penalized (per Bush administration revision)
• Many publicly available industry resources
11
Other Aspects of Privacy Practices
• Must be written in plain language
• Practices/organizations must state they preserve
the right to change NPP
• There must be a complaint process
• Practices/organizations must designate a
privacy official in the office
• See Oregon Health & Science University’s
examples of NPP:
http://www.ohsu.edu/xd/about/services/integrity/i
ps/npp.cfm
12
Authorizations
• Providers must obtain authorization before
using PHI for purposes other than TPO
• They may not condition treatment on an
individual’s authorization
• Covered entities must make “reasonable
safeguards” to limit the use or disclosure
of PHI to the minimum amount necessary
– Non-treatment disclosure governed by
“Minimum Necessary” standard (HHS, 2003)
13
Authorizations Must Include
• Names of authorized persons making use
of disclosure
• Description of information
• Expiration of date of event
• Patient’s right to revoke and instructions
on how to do so
• Purpose of use or disclosure
• Signature and date
14
Business Associates
• Business associate (BA)
– Does work on behalf of a covered entity using
or disclosing PHI
o Anyone who comes in contact with and uses PHI
– Must sign agreement with covered entity
– Is directly accountable to HHS for compliance
and subject to breach notification rules
– Includes all subcontractors to business
associates
15
Allowable Non-TPO Disclosures
• Research
– Overview: HHS, 2004
– Authorization by patient is
generally required
– Authorization waiver can
be provided by an
institutional review board
(IRB) or privacy board
approval
o Must involve “no more
than a minimal risk”
o Research could not be
practically conducted
without waiver and without
access to PHI
• Public Health
– Can be disclosed to public
health agencies for public
health activities
– Also allowed for child
abuse reporting, exposure
to communicable diseases,
and workforce surveillance
• Other
– Law enforcement
– Decedents
– Cadaveric tissue donation
16
Marketing
• Defined as “a communication about a
product/service that encourages recipients of the
communication to purchase/use the
product/service”
• Using PHI for marketing requires authorization
from the individual
• Is not marketing for providers if treatment is
– Therapy recommendation
– Appointment notification
– Prescription refill reminder
17
Physician and Staff Training
• Practices/organizations must
– Designate a privacy Officer
– Develop policies and procedures
– Provide privacy training to workforce
– Develop a system of sanctions for employees
who violate privacy laws
18
Penalties
• Enforced by HHS Office for Civil Rights
http://www.hhs.gov/ocr/index.html
• Penalties higher for “willful neglect” (i.e.,
offender knew about violation or was recklessly
indifferent)
• Original HIPAA criticized for modest penalties
and minimal prosecutions
• HITECH increased severity of penalties:
– Tiered penalty structure ranging from $25,000 to $1.5
million per year, with $100 to $50,000 per violation
(for each record)
19
Does HIPAA Privacy Rule
Protect Privacy?
• Reviews by GAO (2004) and NCVHS (Kanaan, 2007) found
adherence less problematic than anticipated
• Major concerns relate to difficulty in performing clinical research
– Finding and accessing patients for research more difficult (Armstrong et
al., 2005)
– Two-thirds of researchers surveyed reported more difficulty in work; only
one-quarter believed privacy enhanced (Ness, 2007)
– Reports from AAHC (Steinberg, & Rubin, 2009) and Institute of
Medicine (2009) argue for revision to make research easier
• Also concerns with implications for public health (Kamoie & Hodge,
2004)
• Another view calls for less emphasis on consent and more on a
framework that makes for easier sharing of TPO (with some
modifications of “O”) with more rigorous restrictions on other uses,
such as marketing (McGraw, 2009; McGraw et al., 2009)
20
Other Modifications in HITECH
• Breach notification: When 500 or more patients affected,
breach must be reported to local media and OCR
– www.hhs.gov/hipaa/for-professionals/breach-
notification/index.html
– Restrictions on disclosures
– Information about services paid for out of pocket must be
withheld from payers upon request
– TPO disclosures must be tracked and records maintained for
three years
– Covered entities with EHRs must provide or transmit PHI in
electronic format as directed by patient
• Patients can opt out of fundraising appeals
21
Privacy, Confidentiality, and Security
Summary – Lecture c
• HIPAA Privacy Rule restricts disclosure of
information not authorized by a patient
• Privacy Rule is enhanced in HITECH Act
• Patient authorization is not required for
treatment, payment, or operations (TPO)
• HIPAA Privacy Rule defines covered
entities that must adhere and defines
business associates of those entities that
also must adhere
22
Privacy, Confidentiality, and Security
References – Lecture c
References
AAPS (Association of American Physicians and Surgeons). (n.d.). Physician oaths. Retrieved from
http://www.aapsonline.org/ethics/oaths.htm
AHIMA (American Health Information Management Association). (2016). AHIMA introduces new online
HIPAA privacy and security course. Retrieved from
http://www.ahima.org/education/onlineed/Programs/hipaa
Armstrong, D., Kline-Rogers, E., Jani, S. M., et al. (2005). Potential impact of the HIPAA privacy rule
on data collection in a registry of patients with acute coronary syndrome. Archives of Internal
Medicine, 165, 1125–1129.
Breese, P., & Burman, W. (2005). Readability of notice of privacy forms used by major health care
institutions. JAMA, 293, 1593–1594.
BridgeFront. (2009). Impact of the American Recovery & Reinvestment Act of 2009 on HIPAA privacy
& security. Retrieved from http://www.hipaarx.net/downloads/ARRA_HIPAA_White_Paper.pdf
Centers for Medicare and Medicaid Services (CMS). (2007). Security 101 for covered entities.
Baltimore, MD: CMS. Retrieved from
http://www.hhs.gov/sites/default/files/ocr/privacy/hipaa/administrative/securityrule/security101.pdf
GAO (Government Accounting Office). (2004). Health information: First-year experiences under the
federal privacy rule. Retrieved from http://www.gao.gov/new.items/d04965.pdf
HealthIT.gov. (2016). HIPAA and health IT. Retrieved from https://www.healthit.gov/policy-researchers-
implementers/hipaa-and-health-it
23
Privacy, Confidentiality, and Security
References – Lecture c Continued
HealthIT.gov. (2016). Health IT privacy and security resources. Retrieved from
https://www.healthit.gov/providers-professionals/ehr-privacy-security/resources
HHS (Department of Health and Human Services). (n.d.) Covered Entities and Business associates.
Retrieved from http://www.hhs.gov/hipaa/for-professionals/covered-entities/index.html
HHS. (n.d.). Helping entities implement privacy and security protections. Retrieved from
http://www.hhs.gov/hipaa/for-professionals/training/index.html
HHS. (n.d.). HIPAA for individuals. Retrieved from http://www.hhs.gov/hipaa/for-individuals/index.html
HHS. (2003). Minimum necessary requirement. Retrieved from http://www.hhs.gov/hipaa/for-
professionals/privacy/guidance/minimum-necessary-requirement/index.html
HHS. (n.d.). Notice of privacy practices for protected health information. Retrieved from
http://www.hhs.gov/hipaa/for-professionals/privacy/guidance/privacy-practices-for-protected-
health-information/index.html
HHS. (2013). New rule protects patient privacy, secures health information. HHS Press Office.
Retrieved from http://www.hhs.gov/about/news/2013/01/17/new-rule-protects-patient-privacy-
secures-health-information.html
HIMSS (Health Information and Management Systems Society). (2016). HIMSS privacy and security
toolkit. Retrieved from http://www.himss.org/library/healthcare-privacy-security/toolkit
HIMSS. (2009). 2009 HIMSS analytics report: Evaluating HITECH’s impact on healthcare privacy and
security. Chicago, IL: HIMSS Analytics. Retrieved from
http://app.himssanalytics.org/docs/ID_Experts_111509.pdf
24
Privacy, Confidentiality, and Security
References – Lecture c Continued 2
Hirsch, R., and Deixler, H. (2013). Final HIPAA Omnibus Rule brings sweeping changes to health care
privacy law: HIPAA privacy and security obligations extended to business associates and
subcontractors. Privacy & Security Law Report, 12 PVLR 168. Retrieved from
http://www.trideapartners.com/blog/wp-content/uploads/2013/09/HIPAAFinal-Rule.pdf
Houser, S., Houser, H., & Shewchuk, R. (2007). Assessing the effects of the HIPAA privacy rule on
release of patient information by healthcare facilities. Perspectives in Health Information
Management, 23(4), 1.
ID Experts. (2014). The HIPAA Final Omnibus Rule. Portland, OR: ID Experts. Retrieved from
http://lpa.idexpertscorp.com/acton/attachment/6200/f-002d/1/-/-/-/-/file.pdf
IOM (Institute of Medicine). (2009). Beyond the HIPAA Privacy Rule: Enhancing privacy, improving
health through research. Report Brief. Retrieved from http://www.nationalacademies.org/hmd/
~/media/Files/Report%20Files/2009/Beyond-the-HIPAA-Privacy-Rule-Enhancing-Privacy-
Improving-Health-Through-Research/HIPAA%20report%20brief%20FINAL.ashx
Kamoie, B., & Hodge, J. (2004). HIPAA's implications for public health policy and practice: guidance
from the CDC. Public Health Reports, 119, 216–219.
Kanaan, S. (2007). NCVHS Report 2005–2006. Retrieved from
http://www.cdc.gov/nchs/data/ncvhs/ncvhs05-06.pdf
Leyva, C., & Leyva, D. (2011). HIPAA survival guide for providers: Privacy & security rules, 3rd ed.
Largo, FL: HITECH Survival Guide.
25
Privacy, Confidentiality, and Security
References – Lecture c Continued 3
McGraw, D. (2009). Rethinking the role of consent in protecting health information privacy.
Washington, DC: Center for Democracy & Technology. Retrieved from
http://www.cdt.org/healthprivacy/20090126Consent.pdf
McGraw, D., Dempsey, J., Harris, L., & Goldman, J. (2009). Privacy as an enabler, not an impediment:
Building trust into health information exchange. Health Affairs, 28, 416–427.
Nass, S., Levit, L., & Gostin, L. (Eds.). (2009). Beyond the HIPAA privacy rule: Enhancing privacy,
improving health through research. Washington, DC: National Academies Press.
National Institutes of Health (2007). HIPAA privacy rule. Retrieved from
https://privacyruleandresearch.nih.gov
Ness, R. (2007). Influence of the HIPAA privacy rule on health research. JAMA, 298, 2164–2170.
Oregon Health and Science University. OHSU notice of privacy practices. Retrieved from
http://www.ohsu.edu/xd/about/services/integrity/ips/npp.cfm
Steinberg, M., & Rubin, E. (2009). The HIPAA Privacy Rule: Lacks patient benefit, impedes research
growth. Association of Academic Health Centers (AAHC). Retrieved from
http://http://www.aahcdc.org/Portals/41/Series/Issue-
Briefs/HIPAA_Privacy_Rule_Impedes_Research_Growth.pdf?ver=2017-02-17-141347-363
Terry, N. (2014). Health privacy is difficult but not impossible in a post-HIPAA data-driven world.
Chest, 146(3), 835–840.
26
The Culture of Health Care
Privacy, Confidentiality, and Security
Lecture c
This material was developed by Oregon Health &
Science University, funded by the Department of
Health and Human Services, Office of the National
Coordinator for Health Information Technology
under Award Number IU24OC000015. This
material was updated in 2016 by Bellevue College
under Award Number 90WT0002.
27

Weitere ähnliche Inhalte

Was ist angesagt?

Ethics & Professionalism Lecture 4_slides
Ethics & Professionalism Lecture 4_slidesEthics & Professionalism Lecture 4_slides
Ethics & Professionalism Lecture 4_slidesZakCooper1
 
Keys To HIPAA Compliance
Keys To HIPAA ComplianceKeys To HIPAA Compliance
Keys To HIPAA ComplianceCBIZ, Inc.
 
MeHI Privacy & Security Webinar 3.18.15
MeHI Privacy & Security Webinar 3.18.15MeHI Privacy & Security Webinar 3.18.15
MeHI Privacy & Security Webinar 3.18.15MassEHealth
 
Privacy of patient information
Privacy of patient informationPrivacy of patient information
Privacy of patient informationMsIKnowJah
 
Securing sensitive health data
Securing sensitive health dataSecuring sensitive health data
Securing sensitive health dataIn The Pocket
 
Legal implications of HIPAA, HITECH and BAAs
Legal implications of HIPAA, HITECH and BAAsLegal implications of HIPAA, HITECH and BAAs
Legal implications of HIPAA, HITECH and BAAsOnline Tech
 
Privacy of patient data versus patient safety. HIMSS Europe, Nov 6, 2014
Privacy of patient data versus patient safety. HIMSS Europe, Nov 6, 2014Privacy of patient data versus patient safety. HIMSS Europe, Nov 6, 2014
Privacy of patient data versus patient safety. HIMSS Europe, Nov 6, 2014Arjen Noordzij
 
Mha 690 d2 w1
Mha 690 d2 w1Mha 690 d2 w1
Mha 690 d2 w1Sheena83
 
Health Information Management Overview
Health Information Management OverviewHealth Information Management Overview
Health Information Management OverviewDaphnee Fuentevilla
 
Class 1 slides
Class 1 slidesClass 1 slides
Class 1 slidescarolynthelib
 
HIPAA Compliance For Small Practices
HIPAA Compliance For Small PracticesHIPAA Compliance For Small Practices
HIPAA Compliance For Small PracticesNisos Health
 
What is Health Information Management and Technology lecture slides
What is Health Information Management and Technology lecture slidesWhat is Health Information Management and Technology lecture slides
What is Health Information Management and Technology lecture slidesCMDLearning
 
HIPAA Compliance for Developers
HIPAA Compliance for DevelopersHIPAA Compliance for Developers
HIPAA Compliance for DevelopersTrueVault
 
The Mass HIway Overview of the State-wide Health Information Exchange
The Mass HIway Overview of the State-wide Health Information ExchangeThe Mass HIway Overview of the State-wide Health Information Exchange
The Mass HIway Overview of the State-wide Health Information ExchangeMassEHealth
 
HM312 Week 1 part 1 of 2
HM312 Week 1 part 1 of 2HM312 Week 1 part 1 of 2
HM312 Week 1 part 1 of 2BealCollegeOnline
 
Information governance considerations in developing healthcare applications
Information governance considerations in developing healthcare applicationsInformation governance considerations in developing healthcare applications
Information governance considerations in developing healthcare applicationsHANDI HEALTH
 
Discussion2
Discussion2 Discussion2
Discussion2 amberlinn
 

Was ist angesagt? (19)

Ethics & Professionalism Lecture 4_slides
Ethics & Professionalism Lecture 4_slidesEthics & Professionalism Lecture 4_slides
Ethics & Professionalism Lecture 4_slides
 
Keys To HIPAA Compliance
Keys To HIPAA ComplianceKeys To HIPAA Compliance
Keys To HIPAA Compliance
 
MeHI Privacy & Security Webinar 3.18.15
MeHI Privacy & Security Webinar 3.18.15MeHI Privacy & Security Webinar 3.18.15
MeHI Privacy & Security Webinar 3.18.15
 
Privacy of patient information
Privacy of patient informationPrivacy of patient information
Privacy of patient information
 
Securing sensitive health data
Securing sensitive health dataSecuring sensitive health data
Securing sensitive health data
 
Legal implications of HIPAA, HITECH and BAAs
Legal implications of HIPAA, HITECH and BAAsLegal implications of HIPAA, HITECH and BAAs
Legal implications of HIPAA, HITECH and BAAs
 
Privacy of patient data versus patient safety. HIMSS Europe, Nov 6, 2014
Privacy of patient data versus patient safety. HIMSS Europe, Nov 6, 2014Privacy of patient data versus patient safety. HIMSS Europe, Nov 6, 2014
Privacy of patient data versus patient safety. HIMSS Europe, Nov 6, 2014
 
Mha 690 d2 w1
Mha 690 d2 w1Mha 690 d2 w1
Mha 690 d2 w1
 
Health Information Management Overview
Health Information Management OverviewHealth Information Management Overview
Health Information Management Overview
 
Class 1 slides
Class 1 slidesClass 1 slides
Class 1 slides
 
What is hipaa
What is hipaaWhat is hipaa
What is hipaa
 
Electronic Health Record Standardisation in India
Electronic Health Record Standardisation in IndiaElectronic Health Record Standardisation in India
Electronic Health Record Standardisation in India
 
HIPAA Compliance For Small Practices
HIPAA Compliance For Small PracticesHIPAA Compliance For Small Practices
HIPAA Compliance For Small Practices
 
What is Health Information Management and Technology lecture slides
What is Health Information Management and Technology lecture slidesWhat is Health Information Management and Technology lecture slides
What is Health Information Management and Technology lecture slides
 
HIPAA Compliance for Developers
HIPAA Compliance for DevelopersHIPAA Compliance for Developers
HIPAA Compliance for Developers
 
The Mass HIway Overview of the State-wide Health Information Exchange
The Mass HIway Overview of the State-wide Health Information ExchangeThe Mass HIway Overview of the State-wide Health Information Exchange
The Mass HIway Overview of the State-wide Health Information Exchange
 
HM312 Week 1 part 1 of 2
HM312 Week 1 part 1 of 2HM312 Week 1 part 1 of 2
HM312 Week 1 part 1 of 2
 
Information governance considerations in developing healthcare applications
Information governance considerations in developing healthcare applicationsInformation governance considerations in developing healthcare applications
Information governance considerations in developing healthcare applications
 
Discussion2
Discussion2 Discussion2
Discussion2
 

Ähnlich wie Privacy, Confidentiality, and Security Lecture 2_slides

Patient Privacy Provisions of the HITECH Act Implications for Patients and Sm...
Patient Privacy Provisions of the HITECH Act Implications for Patients and Sm...Patient Privacy Provisions of the HITECH Act Implications for Patients and Sm...
Patient Privacy Provisions of the HITECH Act Implications for Patients and Sm...Xiaoming Zeng
 
Hipaa inservice
Hipaa inserviceHipaa inservice
Hipaa inserviceKelly Snyder
 
Hipaa training
Hipaa trainingHipaa training
Hipaa trainingschmoikel987
 
health insurance portability and accountability act.pptx
health insurance portability and accountability act.pptxhealth insurance portability and accountability act.pptx
health insurance portability and accountability act.pptxamartya2087
 
HIPAA INSERVICE 2017
HIPAA INSERVICE 2017 HIPAA INSERVICE 2017
HIPAA INSERVICE 2017 Meg Oser
 
HIPPA-Health Insurance Portability and Accountability Act
HIPPA-Health Insurance Portability and Accountability ActHIPPA-Health Insurance Portability and Accountability Act
HIPPA-Health Insurance Portability and Accountability ActHarshit Trivedi
 
Are You HIPAA Safe?
Are You HIPAA Safe?Are You HIPAA Safe?
Are You HIPAA Safe?TriageLogic
 
Privacy & security training.pptx
Privacy & security training.pptxPrivacy & security training.pptx
Privacy & security training.pptxQmcleod
 
Privacy & security training.pptx
Privacy & security training.pptxPrivacy & security training.pptx
Privacy & security training.pptxQmcleod
 
HIPAA Privacy Training by University of Hawaii
HIPAA Privacy Training by University of HawaiiHIPAA Privacy Training by University of Hawaii
HIPAA Privacy Training by University of HawaiiAtlantic Training, LLC.
 
Hipaa and social media using new
Hipaa and social media using newHipaa and social media using new
Hipaa and social media using newOnlineAudio Training
 
Confidentiality & privacy
Confidentiality & privacyConfidentiality & privacy
Confidentiality & privacykendale
 
Confidentiality & privacy
Confidentiality & privacyConfidentiality & privacy
Confidentiality & privacykendale
 
Annual HIPAA Training
Annual HIPAA TrainingAnnual HIPAA Training
Annual HIPAA TrainingCynthia Holland
 
HIPAA HITECH training 7-9-12
HIPAA HITECH training 7-9-12HIPAA HITECH training 7-9-12
HIPAA HITECH training 7-9-12O2 TESTING SERVICES
 
The importance of confidentiality
The importance of confidentialityThe importance of confidentiality
The importance of confidentialityswilson0050
 

Ähnlich wie Privacy, Confidentiality, and Security Lecture 2_slides (20)

Patient Privacy Provisions of the HITECH Act Implications for Patients and Sm...
Patient Privacy Provisions of the HITECH Act Implications for Patients and Sm...Patient Privacy Provisions of the HITECH Act Implications for Patients and Sm...
Patient Privacy Provisions of the HITECH Act Implications for Patients and Sm...
 
Dustin HIPAA
Dustin HIPAADustin HIPAA
Dustin HIPAA
 
Hipaa inservice
Hipaa inserviceHipaa inservice
Hipaa inservice
 
Hipaa training
Hipaa trainingHipaa training
Hipaa training
 
health insurance portability and accountability act.pptx
health insurance portability and accountability act.pptxhealth insurance portability and accountability act.pptx
health insurance portability and accountability act.pptx
 
HIPAA INSERVICE 2017
HIPAA INSERVICE 2017 HIPAA INSERVICE 2017
HIPAA INSERVICE 2017
 
HIPPA-Health Insurance Portability and Accountability Act
HIPPA-Health Insurance Portability and Accountability ActHIPPA-Health Insurance Portability and Accountability Act
HIPPA-Health Insurance Portability and Accountability Act
 
Are You HIPAA Safe?
Are You HIPAA Safe?Are You HIPAA Safe?
Are You HIPAA Safe?
 
Privacy & security training.pptx
Privacy & security training.pptxPrivacy & security training.pptx
Privacy & security training.pptx
 
Privacy & security training.pptx
Privacy & security training.pptxPrivacy & security training.pptx
Privacy & security training.pptx
 
HIPAA Privacy Training by University of Hawaii
HIPAA Privacy Training by University of HawaiiHIPAA Privacy Training by University of Hawaii
HIPAA Privacy Training by University of Hawaii
 
Hipaa and social media using new
Hipaa and social media using newHipaa and social media using new
Hipaa and social media using new
 
A12_Beyond_HIPAA_PPT1
A12_Beyond_HIPAA_PPT1A12_Beyond_HIPAA_PPT1
A12_Beyond_HIPAA_PPT1
 
DVHIMSS Ensuring Privacy and Security of HIEs in PA
DVHIMSS Ensuring Privacy and Security of HIEs in PADVHIMSS Ensuring Privacy and Security of HIEs in PA
DVHIMSS Ensuring Privacy and Security of HIEs in PA
 
Confidentiality & privacy
Confidentiality & privacyConfidentiality & privacy
Confidentiality & privacy
 
Confidentiality & privacy
Confidentiality & privacyConfidentiality & privacy
Confidentiality & privacy
 
Annual HIPAA Training
Annual HIPAA TrainingAnnual HIPAA Training
Annual HIPAA Training
 
HIPAA HITECH training 7-9-12
HIPAA HITECH training 7-9-12HIPAA HITECH training 7-9-12
HIPAA HITECH training 7-9-12
 
The importance of confidentiality
The importance of confidentialityThe importance of confidentiality
The importance of confidentiality
 
UNA HIPAA Training 8-13
UNA HIPAA Training   8-13UNA HIPAA Training   8-13
UNA HIPAA Training 8-13
 

Mehr von ZakCooper1

Sociotechnical Aspects: Clinicians and Technology Lecture 3_slides
Sociotechnical Aspects: Clinicians and Technology Lecture 3_slidesSociotechnical Aspects: Clinicians and Technology Lecture 3_slides
Sociotechnical Aspects: Clinicians and Technology Lecture 3_slidesZakCooper1
 
Sociotechnical Aspects: Clinicians and Technology Lecture 2_slides
Sociotechnical Aspects: Clinicians and Technology Lecture 2_slidesSociotechnical Aspects: Clinicians and Technology Lecture 2_slides
Sociotechnical Aspects: Clinicians and Technology Lecture 2_slidesZakCooper1
 
Sociotechnical Aspects: Clinicians and Technology_ lecture 1_slides
Sociotechnical Aspects: Clinicians and Technology_ lecture 1_slidesSociotechnical Aspects: Clinicians and Technology_ lecture 1_slides
Sociotechnical Aspects: Clinicians and Technology_ lecture 1_slidesZakCooper1
 
Privacy, Confidentiality, and Security Lecture 4_slides
Privacy, Confidentiality, and Security Lecture 4_slidesPrivacy, Confidentiality, and Security Lecture 4_slides
Privacy, Confidentiality, and Security Lecture 4_slidesZakCooper1
 
Ethics & Professionalism Lecture 3_slides
Ethics & Professionalism Lecture 3_slidesEthics & Professionalism Lecture 3_slides
Ethics & Professionalism Lecture 3_slidesZakCooper1
 
Ethics & Professionalism Lecture 2_slides
Ethics & Professionalism Lecture 2_slidesEthics & Professionalism Lecture 2_slides
Ethics & Professionalism Lecture 2_slidesZakCooper1
 
Ethics & Professionalism_lecture 1_slides
Ethics & Professionalism_lecture 1_slidesEthics & Professionalism_lecture 1_slides
Ethics & Professionalism_lecture 1_slidesZakCooper1
 
Quality Measurement and Improvement Lecture 3_slides
Quality Measurement and Improvement Lecture 3_slidesQuality Measurement and Improvement Lecture 3_slides
Quality Measurement and Improvement Lecture 3_slidesZakCooper1
 
Quality Measurement and Improvement Lecture 2_slides
Quality Measurement and Improvement Lecture 2_slidesQuality Measurement and Improvement Lecture 2_slides
Quality Measurement and Improvement Lecture 2_slidesZakCooper1
 
Quality Measurement and Improvement_lecture 1_slides
Quality Measurement and Improvement_lecture 1_slidesQuality Measurement and Improvement_lecture 1_slides
Quality Measurement and Improvement_lecture 1_slidesZakCooper1
 
Nursing Care Processes Lecture 3_slides
Nursing Care Processes Lecture 3_slidesNursing Care Processes Lecture 3_slides
Nursing Care Processes Lecture 3_slidesZakCooper1
 
Nursing Care Processes Lecture 2_slides
Nursing Care Processes Lecture 2_slidesNursing Care Processes Lecture 2_slides
Nursing Care Processes Lecture 2_slidesZakCooper1
 
Nursing Care Processe_ lecture 1_slides
Nursing Care Processe_ lecture 1_slidesNursing Care Processe_ lecture 1_slides
Nursing Care Processe_ lecture 1_slidesZakCooper1
 
Evidence Based Practice Lecture 7_slides
Evidence Based Practice Lecture 7_slidesEvidence Based Practice Lecture 7_slides
Evidence Based Practice Lecture 7_slidesZakCooper1
 
Evidence Based Practice Lecture 6_slides
Evidence Based Practice Lecture 6_slidesEvidence Based Practice Lecture 6_slides
Evidence Based Practice Lecture 6_slidesZakCooper1
 
Evidence Based Practice_lecture 5_slides
Evidence Based Practice_lecture 5_slidesEvidence Based Practice_lecture 5_slides
Evidence Based Practice_lecture 5_slidesZakCooper1
 

Mehr von ZakCooper1 (16)

Sociotechnical Aspects: Clinicians and Technology Lecture 3_slides
Sociotechnical Aspects: Clinicians and Technology Lecture 3_slidesSociotechnical Aspects: Clinicians and Technology Lecture 3_slides
Sociotechnical Aspects: Clinicians and Technology Lecture 3_slides
 
Sociotechnical Aspects: Clinicians and Technology Lecture 2_slides
Sociotechnical Aspects: Clinicians and Technology Lecture 2_slidesSociotechnical Aspects: Clinicians and Technology Lecture 2_slides
Sociotechnical Aspects: Clinicians and Technology Lecture 2_slides
 
Sociotechnical Aspects: Clinicians and Technology_ lecture 1_slides
Sociotechnical Aspects: Clinicians and Technology_ lecture 1_slidesSociotechnical Aspects: Clinicians and Technology_ lecture 1_slides
Sociotechnical Aspects: Clinicians and Technology_ lecture 1_slides
 
Privacy, Confidentiality, and Security Lecture 4_slides
Privacy, Confidentiality, and Security Lecture 4_slidesPrivacy, Confidentiality, and Security Lecture 4_slides
Privacy, Confidentiality, and Security Lecture 4_slides
 
Ethics & Professionalism Lecture 3_slides
Ethics & Professionalism Lecture 3_slidesEthics & Professionalism Lecture 3_slides
Ethics & Professionalism Lecture 3_slides
 
Ethics & Professionalism Lecture 2_slides
Ethics & Professionalism Lecture 2_slidesEthics & Professionalism Lecture 2_slides
Ethics & Professionalism Lecture 2_slides
 
Ethics & Professionalism_lecture 1_slides
Ethics & Professionalism_lecture 1_slidesEthics & Professionalism_lecture 1_slides
Ethics & Professionalism_lecture 1_slides
 
Quality Measurement and Improvement Lecture 3_slides
Quality Measurement and Improvement Lecture 3_slidesQuality Measurement and Improvement Lecture 3_slides
Quality Measurement and Improvement Lecture 3_slides
 
Quality Measurement and Improvement Lecture 2_slides
Quality Measurement and Improvement Lecture 2_slidesQuality Measurement and Improvement Lecture 2_slides
Quality Measurement and Improvement Lecture 2_slides
 
Quality Measurement and Improvement_lecture 1_slides
Quality Measurement and Improvement_lecture 1_slidesQuality Measurement and Improvement_lecture 1_slides
Quality Measurement and Improvement_lecture 1_slides
 
Nursing Care Processes Lecture 3_slides
Nursing Care Processes Lecture 3_slidesNursing Care Processes Lecture 3_slides
Nursing Care Processes Lecture 3_slides
 
Nursing Care Processes Lecture 2_slides
Nursing Care Processes Lecture 2_slidesNursing Care Processes Lecture 2_slides
Nursing Care Processes Lecture 2_slides
 
Nursing Care Processe_ lecture 1_slides
Nursing Care Processe_ lecture 1_slidesNursing Care Processe_ lecture 1_slides
Nursing Care Processe_ lecture 1_slides
 
Evidence Based Practice Lecture 7_slides
Evidence Based Practice Lecture 7_slidesEvidence Based Practice Lecture 7_slides
Evidence Based Practice Lecture 7_slides
 
Evidence Based Practice Lecture 6_slides
Evidence Based Practice Lecture 6_slidesEvidence Based Practice Lecture 6_slides
Evidence Based Practice Lecture 6_slides
 
Evidence Based Practice_lecture 5_slides
Evidence Based Practice_lecture 5_slidesEvidence Based Practice_lecture 5_slides
Evidence Based Practice_lecture 5_slides
 

KĂźrzlich hochgeladen

VIP Call Girls Hyderabad Megha 9907093804 Independent Escort Service Hyderabad
VIP Call Girls Hyderabad Megha 9907093804 Independent Escort Service HyderabadVIP Call Girls Hyderabad Megha 9907093804 Independent Escort Service Hyderabad
VIP Call Girls Hyderabad Megha 9907093804 Independent Escort Service Hyderabaddelhimodelshub1
 
Russian Escorts Delhi | 9711199171 | all area service available
Russian Escorts Delhi | 9711199171 | all area service availableRussian Escorts Delhi | 9711199171 | all area service available
Russian Escorts Delhi | 9711199171 | all area service availablesandeepkumar69420
 
College Call Girls Mumbai Alia 9910780858 Independent Escort Service Mumbai
College Call Girls Mumbai Alia 9910780858 Independent Escort Service MumbaiCollege Call Girls Mumbai Alia 9910780858 Independent Escort Service Mumbai
College Call Girls Mumbai Alia 9910780858 Independent Escort Service Mumbaisonalikaur4
 
Experience learning - lessons from 25 years of ATACC - Mark Forrest and Halde...
Experience learning - lessons from 25 years of ATACC - Mark Forrest and Halde...Experience learning - lessons from 25 years of ATACC - Mark Forrest and Halde...
Experience learning - lessons from 25 years of ATACC - Mark Forrest and Halde...scanFOAM
 
College Call Girls Hyderabad Sakshi 9907093804 Independent Escort Service Hyd...
College Call Girls Hyderabad Sakshi 9907093804 Independent Escort Service Hyd...College Call Girls Hyderabad Sakshi 9907093804 Independent Escort Service Hyd...
College Call Girls Hyderabad Sakshi 9907093804 Independent Escort Service Hyd...delhimodelshub1
 
Hi,Fi Call Girl In Marathahalli - 7001305949 with real photos and phone numbers
Hi,Fi Call Girl In Marathahalli - 7001305949 with real photos and phone numbersHi,Fi Call Girl In Marathahalli - 7001305949 with real photos and phone numbers
Hi,Fi Call Girl In Marathahalli - 7001305949 with real photos and phone numbersnarwatsonia7
 
2024 HCAT Healthcare Technology Insights
2024 HCAT Healthcare Technology Insights2024 HCAT Healthcare Technology Insights
2024 HCAT Healthcare Technology InsightsHealth Catalyst
 
9711199012 Najafgarh Call Girls ₹5.5k With COD Free Home Delivery
9711199012 Najafgarh Call Girls ₹5.5k With COD Free Home Delivery9711199012 Najafgarh Call Girls ₹5.5k With COD Free Home Delivery
9711199012 Najafgarh Call Girls ₹5.5k With COD Free Home Deliverymarshasaifi
 
Book Call Girls in Hosur - 7001305949 | 24x7 Service Available Near Me
Book Call Girls in Hosur - 7001305949 | 24x7 Service Available Near MeBook Call Girls in Hosur - 7001305949 | 24x7 Service Available Near Me
Book Call Girls in Hosur - 7001305949 | 24x7 Service Available Near Menarwatsonia7
 
Call Girls Gurgaon Vani 9999965857 Independent Escort Service Gurgaon
Call Girls Gurgaon Vani 9999965857 Independent Escort Service GurgaonCall Girls Gurgaon Vani 9999965857 Independent Escort Service Gurgaon
Call Girls Gurgaon Vani 9999965857 Independent Escort Service Gurgaonnitachopra
 
Russian Call Girls in Goa Samaira 7001305949 Independent Escort Service Goa
Russian Call Girls in Goa Samaira 7001305949 Independent Escort Service GoaRussian Call Girls in Goa Samaira 7001305949 Independent Escort Service Goa
Russian Call Girls in Goa Samaira 7001305949 Independent Escort Service Goanarwatsonia7
 
Russian Call Girls Hyderabad Saloni 9907093804 Independent Escort Service Hyd...
Russian Call Girls Hyderabad Saloni 9907093804 Independent Escort Service Hyd...Russian Call Girls Hyderabad Saloni 9907093804 Independent Escort Service Hyd...
Russian Call Girls Hyderabad Saloni 9907093804 Independent Escort Service Hyd...delhimodelshub1
 
2025 Inpatient Prospective Payment System (IPPS) Proposed Rule
2025 Inpatient Prospective Payment System (IPPS) Proposed Rule2025 Inpatient Prospective Payment System (IPPS) Proposed Rule
2025 Inpatient Prospective Payment System (IPPS) Proposed RuleShelby Lewis
 
Single Assessment Framework - What We Know So Far
Single Assessment Framework - What We Know So FarSingle Assessment Framework - What We Know So Far
Single Assessment Framework - What We Know So FarCareLineLive
 
Gurgaon Sector 68 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few ...
Gurgaon Sector 68 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few ...Gurgaon Sector 68 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few ...
Gurgaon Sector 68 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few ...ggsonu500
 
Russian Call Girls in Chandigarh Ojaswi ❤️🍑 9907093804 👄🫦 Independent Escort ...
Russian Call Girls in Chandigarh Ojaswi ❤️🍑 9907093804 👄🫦 Independent Escort ...Russian Call Girls in Chandigarh Ojaswi ❤️🍑 9907093804 👄🫦 Independent Escort ...
Russian Call Girls in Chandigarh Ojaswi ❤️🍑 9907093804 👄🫦 Independent Escort ...High Profile Call Girls Chandigarh Aarushi
 
Call Girls Secunderabad 7001305949 all area service COD available Any Time
Call Girls Secunderabad 7001305949 all area service COD available Any TimeCall Girls Secunderabad 7001305949 all area service COD available Any Time
Call Girls Secunderabad 7001305949 all area service COD available Any Timedelhimodelshub1
 

KĂźrzlich hochgeladen (20)

Russian Call Girls South Delhi 9711199171 discount on your booking
Russian Call Girls South Delhi 9711199171 discount on your bookingRussian Call Girls South Delhi 9711199171 discount on your booking
Russian Call Girls South Delhi 9711199171 discount on your booking
 
VIP Call Girls Hyderabad Megha 9907093804 Independent Escort Service Hyderabad
VIP Call Girls Hyderabad Megha 9907093804 Independent Escort Service HyderabadVIP Call Girls Hyderabad Megha 9907093804 Independent Escort Service Hyderabad
VIP Call Girls Hyderabad Megha 9907093804 Independent Escort Service Hyderabad
 
Russian Escorts Delhi | 9711199171 | all area service available
Russian Escorts Delhi | 9711199171 | all area service availableRussian Escorts Delhi | 9711199171 | all area service available
Russian Escorts Delhi | 9711199171 | all area service available
 
Call Girls in Lucknow Esha 🔝 8923113531 🔝 🎶 Independent Escort Service Lucknow
Call Girls in Lucknow Esha 🔝 8923113531  🔝 🎶 Independent Escort Service LucknowCall Girls in Lucknow Esha 🔝 8923113531  🔝 🎶 Independent Escort Service Lucknow
Call Girls in Lucknow Esha 🔝 8923113531 🔝 🎶 Independent Escort Service Lucknow
 
College Call Girls Mumbai Alia 9910780858 Independent Escort Service Mumbai
College Call Girls Mumbai Alia 9910780858 Independent Escort Service MumbaiCollege Call Girls Mumbai Alia 9910780858 Independent Escort Service Mumbai
College Call Girls Mumbai Alia 9910780858 Independent Escort Service Mumbai
 
Experience learning - lessons from 25 years of ATACC - Mark Forrest and Halde...
Experience learning - lessons from 25 years of ATACC - Mark Forrest and Halde...Experience learning - lessons from 25 years of ATACC - Mark Forrest and Halde...
Experience learning - lessons from 25 years of ATACC - Mark Forrest and Halde...
 
College Call Girls Hyderabad Sakshi 9907093804 Independent Escort Service Hyd...
College Call Girls Hyderabad Sakshi 9907093804 Independent Escort Service Hyd...College Call Girls Hyderabad Sakshi 9907093804 Independent Escort Service Hyd...
College Call Girls Hyderabad Sakshi 9907093804 Independent Escort Service Hyd...
 
Hi,Fi Call Girl In Marathahalli - 7001305949 with real photos and phone numbers
Hi,Fi Call Girl In Marathahalli - 7001305949 with real photos and phone numbersHi,Fi Call Girl In Marathahalli - 7001305949 with real photos and phone numbers
Hi,Fi Call Girl In Marathahalli - 7001305949 with real photos and phone numbers
 
2024 HCAT Healthcare Technology Insights
2024 HCAT Healthcare Technology Insights2024 HCAT Healthcare Technology Insights
2024 HCAT Healthcare Technology Insights
 
9711199012 Najafgarh Call Girls ₹5.5k With COD Free Home Delivery
9711199012 Najafgarh Call Girls ₹5.5k With COD Free Home Delivery9711199012 Najafgarh Call Girls ₹5.5k With COD Free Home Delivery
9711199012 Najafgarh Call Girls ₹5.5k With COD Free Home Delivery
 
Book Call Girls in Hosur - 7001305949 | 24x7 Service Available Near Me
Book Call Girls in Hosur - 7001305949 | 24x7 Service Available Near MeBook Call Girls in Hosur - 7001305949 | 24x7 Service Available Near Me
Book Call Girls in Hosur - 7001305949 | 24x7 Service Available Near Me
 
Call Girls Gurgaon Vani 9999965857 Independent Escort Service Gurgaon
Call Girls Gurgaon Vani 9999965857 Independent Escort Service GurgaonCall Girls Gurgaon Vani 9999965857 Independent Escort Service Gurgaon
Call Girls Gurgaon Vani 9999965857 Independent Escort Service Gurgaon
 
Russian Call Girls in Goa Samaira 7001305949 Independent Escort Service Goa
Russian Call Girls in Goa Samaira 7001305949 Independent Escort Service GoaRussian Call Girls in Goa Samaira 7001305949 Independent Escort Service Goa
Russian Call Girls in Goa Samaira 7001305949 Independent Escort Service Goa
 
Russian Call Girls Hyderabad Saloni 9907093804 Independent Escort Service Hyd...
Russian Call Girls Hyderabad Saloni 9907093804 Independent Escort Service Hyd...Russian Call Girls Hyderabad Saloni 9907093804 Independent Escort Service Hyd...
Russian Call Girls Hyderabad Saloni 9907093804 Independent Escort Service Hyd...
 
2025 Inpatient Prospective Payment System (IPPS) Proposed Rule
2025 Inpatient Prospective Payment System (IPPS) Proposed Rule2025 Inpatient Prospective Payment System (IPPS) Proposed Rule
2025 Inpatient Prospective Payment System (IPPS) Proposed Rule
 
Single Assessment Framework - What We Know So Far
Single Assessment Framework - What We Know So FarSingle Assessment Framework - What We Know So Far
Single Assessment Framework - What We Know So Far
 
Gurgaon Sector 68 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few ...
Gurgaon Sector 68 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few ...Gurgaon Sector 68 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few ...
Gurgaon Sector 68 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few ...
 
Russian Call Girls in Chandigarh Ojaswi ❤️🍑 9907093804 👄🫦 Independent Escort ...
Russian Call Girls in Chandigarh Ojaswi ❤️🍑 9907093804 👄🫦 Independent Escort ...Russian Call Girls in Chandigarh Ojaswi ❤️🍑 9907093804 👄🫦 Independent Escort ...
Russian Call Girls in Chandigarh Ojaswi ❤️🍑 9907093804 👄🫦 Independent Escort ...
 
Call Girls Secunderabad 7001305949 all area service COD available Any Time
Call Girls Secunderabad 7001305949 all area service COD available Any TimeCall Girls Secunderabad 7001305949 all area service COD available Any Time
Call Girls Secunderabad 7001305949 all area service COD available Any Time
 
Call Girls Guwahati Aaradhya 👉 7001305949👈 🎶 Independent Escort Service Guwahati
Call Girls Guwahati Aaradhya 👉 7001305949👈 🎶 Independent Escort Service GuwahatiCall Girls Guwahati Aaradhya 👉 7001305949👈 🎶 Independent Escort Service Guwahati
Call Girls Guwahati Aaradhya 👉 7001305949👈 🎶 Independent Escort Service Guwahati
 

Privacy, Confidentiality, and Security Lecture 2_slides

  • 1.
  • 2. The Culture of Health Care Privacy, Confidentiality, and Security Lecture c This material (Comp 2 Unit 9) was developed by Oregon Health & Science University, funded by the Department of Health and Human Services, Office of the National Coordinator for Health Information Technology under Award Number IU24OC000015. This material was updated in 2016 by Bellevue College under Award Number 90WT0002. This work is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc-sa/4.0/.
  • 3. Privacy, Confidentiality, and Security Learning Objectives • Define and discern the differences between privacy, confidentiality, and security (Lecture a). • Discuss methods for using information technology to protect privacy and confidentiality (Lecture b). • Describe and apply privacy, confidentiality, and security under the tenets of HIPAA Privacy and Security rules (Lectures c and d). • Discuss the intersection of a patient’s right to privacy with the need to share and exchange patient information (Lecture d). 3
  • 4. HIPAA Privacy and Security • 2006 HIPAA Rule – Privacy Rule: http://www.hhs.gov/ocr/privacy/hipaa/understanding/summary – Security Rule: www.hhs.gov/ocr/privacy/hipaa/understanding/srsummary.html • 2008 Genetic Information Nondiscrimination Act (GINA) – Genetic information is protected under the HIPAA Privacy Rule – Prohibits most health plans from using/disclosing genetic information for underwriting purposes – www.eeoc.gov/laws/statutes/gina.cfm • 2009 ARRA/HITECH legislation enhanced both rules – http://www.hhs.gov/ocr/privacy • 2013 HIPAA Rule updated – Strengthens privacy protections, new rights for individuals to their health information, strengthens the government’s ability to enforce the law – www.hhs.gov/about/news/2013/01/17/new-rule-protects-patient-privacy-secures- health-information.html 4
  • 5. HIPAA Privacy and Security Continued – Original rule summaries available (ID Experts, 2014; BridgeFront, 2009; Leyva, 2011) – HHS resources such as HIPAA & Health IT – Various HIPAA tool kits – NIH’s research entities guides – Employee training resources – HIPAA certificates and training courses – HHS’s consumer resources for the public 5
  • 6. HIPAA Privacy Rule • Applies to “covered entities” (CEs)—any entity that bills electronically – Health care providers o Clinicians, hospitals, clinics, etc. – Health plans o HMOs, insurance companies, etc. – Healthcare clearinghouses o Billing services – Business associates • Patient must authorize any disclosure, with the exception of “treatment, payment, or operations” (TPO); does not preclude health care providers from sharing data for patient care, a common misunderstanding (Houser, Houser, & Shewchuk, 2007) 6
  • 7. Physician Oaths of Privacy Are Not New • Oath of Hippocrates, fifth century BC – “All that may come to my knowledge in the exercise of my profession or outside of my profession or in daily commerce with men, which ought not to be spread abroad, I will keep secret and never reveal.” • Declaration of Geneva, 20th century – “I will respect the secrets which are confided in me, even after the patient has died.” AAPS, n.d.
  • 8. What Is Covered? • Protected health information (PHI) – Collected from patient and created by covered entity – Individually identifiable – Electronically transmitted—in reality, all information • Extends to covered entities and business associates • De-identified information is not covered • Pre-emption – HIPAA trumps state law if state law is less protective of privacy and security, but state laws that go beyond the HIPAA protections are not nullified by HIPAA and must be followed 8
  • 9. Identifiers Contained in Protected Health Information (PHI) • Name • Address (street address, city, county, ZIP code) • Names of relatives • Names of employers • E-mail address • Fax number • Telephone number • Birth date • Finger or voice prints • Photographic images • Social Security number • Internet protocol (IP) address • Any vehicle or device serial number • Medical record number • Health plan beneficiary number • Account number • Certificate/license number • Web URL • Any other unique identifying number, characteristic, or code 9
  • 10. Key Privacy Compliance Areas • Notice of privacy practices • Authorization • Business associates and subcontractors • Allowable disclosures • Marketing • Physician and staff training • Penalties 10
  • 11. Notice of Privacy Practices • Patient has right to – Adequate notice of privacy practices – Uses and disclosures of PHI – Description of individual rights – Covered entities’ legal duties • One problem is readability of Notice of Privacy Practices (NPP) forms comparable to medical journal articles and beyond 80% of U.S. adults (Breese & Burman, 2005) • Physicians’ requirements for obtaining NPP consent include – “Good faith effort” to obtain acknowledgment during first provision of in- person service – Failure to obtain is not penalized (per Bush administration revision) • Many publicly available industry resources 11
  • 12. Other Aspects of Privacy Practices • Must be written in plain language • Practices/organizations must state they preserve the right to change NPP • There must be a complaint process • Practices/organizations must designate a privacy official in the office • See Oregon Health & Science University’s examples of NPP: http://www.ohsu.edu/xd/about/services/integrity/i ps/npp.cfm 12
  • 13. Authorizations • Providers must obtain authorization before using PHI for purposes other than TPO • They may not condition treatment on an individual’s authorization • Covered entities must make “reasonable safeguards” to limit the use or disclosure of PHI to the minimum amount necessary – Non-treatment disclosure governed by “Minimum Necessary” standard (HHS, 2003) 13
  • 14. Authorizations Must Include • Names of authorized persons making use of disclosure • Description of information • Expiration of date of event • Patient’s right to revoke and instructions on how to do so • Purpose of use or disclosure • Signature and date 14
  • 15. Business Associates • Business associate (BA) – Does work on behalf of a covered entity using or disclosing PHI o Anyone who comes in contact with and uses PHI – Must sign agreement with covered entity – Is directly accountable to HHS for compliance and subject to breach notification rules – Includes all subcontractors to business associates 15
  • 16. Allowable Non-TPO Disclosures • Research – Overview: HHS, 2004 – Authorization by patient is generally required – Authorization waiver can be provided by an institutional review board (IRB) or privacy board approval o Must involve “no more than a minimal risk” o Research could not be practically conducted without waiver and without access to PHI • Public Health – Can be disclosed to public health agencies for public health activities – Also allowed for child abuse reporting, exposure to communicable diseases, and workforce surveillance • Other – Law enforcement – Decedents – Cadaveric tissue donation 16
  • 17. Marketing • Defined as “a communication about a product/service that encourages recipients of the communication to purchase/use the product/service” • Using PHI for marketing requires authorization from the individual • Is not marketing for providers if treatment is – Therapy recommendation – Appointment notification – Prescription refill reminder 17
  • 18. Physician and Staff Training • Practices/organizations must – Designate a privacy Officer – Develop policies and procedures – Provide privacy training to workforce – Develop a system of sanctions for employees who violate privacy laws 18
  • 19. Penalties • Enforced by HHS Office for Civil Rights http://www.hhs.gov/ocr/index.html • Penalties higher for “willful neglect” (i.e., offender knew about violation or was recklessly indifferent) • Original HIPAA criticized for modest penalties and minimal prosecutions • HITECH increased severity of penalties: – Tiered penalty structure ranging from $25,000 to $1.5 million per year, with $100 to $50,000 per violation (for each record) 19
  • 20. Does HIPAA Privacy Rule Protect Privacy? • Reviews by GAO (2004) and NCVHS (Kanaan, 2007) found adherence less problematic than anticipated • Major concerns relate to difficulty in performing clinical research – Finding and accessing patients for research more difficult (Armstrong et al., 2005) – Two-thirds of researchers surveyed reported more difficulty in work; only one-quarter believed privacy enhanced (Ness, 2007) – Reports from AAHC (Steinberg, & Rubin, 2009) and Institute of Medicine (2009) argue for revision to make research easier • Also concerns with implications for public health (Kamoie & Hodge, 2004) • Another view calls for less emphasis on consent and more on a framework that makes for easier sharing of TPO (with some modifications of “O”) with more rigorous restrictions on other uses, such as marketing (McGraw, 2009; McGraw et al., 2009) 20
  • 21. Other Modifications in HITECH • Breach notification: When 500 or more patients affected, breach must be reported to local media and OCR – www.hhs.gov/hipaa/for-professionals/breach- notification/index.html – Restrictions on disclosures – Information about services paid for out of pocket must be withheld from payers upon request – TPO disclosures must be tracked and records maintained for three years – Covered entities with EHRs must provide or transmit PHI in electronic format as directed by patient • Patients can opt out of fundraising appeals 21
  • 22. Privacy, Confidentiality, and Security Summary – Lecture c • HIPAA Privacy Rule restricts disclosure of information not authorized by a patient • Privacy Rule is enhanced in HITECH Act • Patient authorization is not required for treatment, payment, or operations (TPO) • HIPAA Privacy Rule defines covered entities that must adhere and defines business associates of those entities that also must adhere 22
  • 23. Privacy, Confidentiality, and Security References – Lecture c References AAPS (Association of American Physicians and Surgeons). (n.d.). Physician oaths. Retrieved from http://www.aapsonline.org/ethics/oaths.htm AHIMA (American Health Information Management Association). (2016). AHIMA introduces new online HIPAA privacy and security course. Retrieved from http://www.ahima.org/education/onlineed/Programs/hipaa Armstrong, D., Kline-Rogers, E., Jani, S. M., et al. (2005). Potential impact of the HIPAA privacy rule on data collection in a registry of patients with acute coronary syndrome. Archives of Internal Medicine, 165, 1125–1129. Breese, P., & Burman, W. (2005). Readability of notice of privacy forms used by major health care institutions. JAMA, 293, 1593–1594. BridgeFront. (2009). Impact of the American Recovery & Reinvestment Act of 2009 on HIPAA privacy & security. Retrieved from http://www.hipaarx.net/downloads/ARRA_HIPAA_White_Paper.pdf Centers for Medicare and Medicaid Services (CMS). (2007). Security 101 for covered entities. Baltimore, MD: CMS. Retrieved from http://www.hhs.gov/sites/default/files/ocr/privacy/hipaa/administrative/securityrule/security101.pdf GAO (Government Accounting Office). (2004). Health information: First-year experiences under the federal privacy rule. Retrieved from http://www.gao.gov/new.items/d04965.pdf HealthIT.gov. (2016). HIPAA and health IT. Retrieved from https://www.healthit.gov/policy-researchers- implementers/hipaa-and-health-it 23
  • 24. Privacy, Confidentiality, and Security References – Lecture c Continued HealthIT.gov. (2016). Health IT privacy and security resources. Retrieved from https://www.healthit.gov/providers-professionals/ehr-privacy-security/resources HHS (Department of Health and Human Services). (n.d.) Covered Entities and Business associates. Retrieved from http://www.hhs.gov/hipaa/for-professionals/covered-entities/index.html HHS. (n.d.). Helping entities implement privacy and security protections. Retrieved from http://www.hhs.gov/hipaa/for-professionals/training/index.html HHS. (n.d.). HIPAA for individuals. Retrieved from http://www.hhs.gov/hipaa/for-individuals/index.html HHS. (2003). Minimum necessary requirement. Retrieved from http://www.hhs.gov/hipaa/for- professionals/privacy/guidance/minimum-necessary-requirement/index.html HHS. (n.d.). Notice of privacy practices for protected health information. Retrieved from http://www.hhs.gov/hipaa/for-professionals/privacy/guidance/privacy-practices-for-protected- health-information/index.html HHS. (2013). New rule protects patient privacy, secures health information. HHS Press Office. Retrieved from http://www.hhs.gov/about/news/2013/01/17/new-rule-protects-patient-privacy- secures-health-information.html HIMSS (Health Information and Management Systems Society). (2016). HIMSS privacy and security toolkit. Retrieved from http://www.himss.org/library/healthcare-privacy-security/toolkit HIMSS. (2009). 2009 HIMSS analytics report: Evaluating HITECH’s impact on healthcare privacy and security. Chicago, IL: HIMSS Analytics. Retrieved from http://app.himssanalytics.org/docs/ID_Experts_111509.pdf 24
  • 25. Privacy, Confidentiality, and Security References – Lecture c Continued 2 Hirsch, R., and Deixler, H. (2013). Final HIPAA Omnibus Rule brings sweeping changes to health care privacy law: HIPAA privacy and security obligations extended to business associates and subcontractors. Privacy & Security Law Report, 12 PVLR 168. Retrieved from http://www.trideapartners.com/blog/wp-content/uploads/2013/09/HIPAAFinal-Rule.pdf Houser, S., Houser, H., & Shewchuk, R. (2007). Assessing the effects of the HIPAA privacy rule on release of patient information by healthcare facilities. Perspectives in Health Information Management, 23(4), 1. ID Experts. (2014). The HIPAA Final Omnibus Rule. Portland, OR: ID Experts. Retrieved from http://lpa.idexpertscorp.com/acton/attachment/6200/f-002d/1/-/-/-/-/file.pdf IOM (Institute of Medicine). (2009). Beyond the HIPAA Privacy Rule: Enhancing privacy, improving health through research. Report Brief. Retrieved from http://www.nationalacademies.org/hmd/ ~/media/Files/Report%20Files/2009/Beyond-the-HIPAA-Privacy-Rule-Enhancing-Privacy- Improving-Health-Through-Research/HIPAA%20report%20brief%20FINAL.ashx Kamoie, B., & Hodge, J. (2004). HIPAA's implications for public health policy and practice: guidance from the CDC. Public Health Reports, 119, 216–219. Kanaan, S. (2007). NCVHS Report 2005–2006. Retrieved from http://www.cdc.gov/nchs/data/ncvhs/ncvhs05-06.pdf Leyva, C., & Leyva, D. (2011). HIPAA survival guide for providers: Privacy & security rules, 3rd ed. Largo, FL: HITECH Survival Guide. 25
  • 26. Privacy, Confidentiality, and Security References – Lecture c Continued 3 McGraw, D. (2009). Rethinking the role of consent in protecting health information privacy. Washington, DC: Center for Democracy & Technology. Retrieved from http://www.cdt.org/healthprivacy/20090126Consent.pdf McGraw, D., Dempsey, J., Harris, L., & Goldman, J. (2009). Privacy as an enabler, not an impediment: Building trust into health information exchange. Health Affairs, 28, 416–427. Nass, S., Levit, L., & Gostin, L. (Eds.). (2009). Beyond the HIPAA privacy rule: Enhancing privacy, improving health through research. Washington, DC: National Academies Press. National Institutes of Health (2007). HIPAA privacy rule. Retrieved from https://privacyruleandresearch.nih.gov Ness, R. (2007). Influence of the HIPAA privacy rule on health research. JAMA, 298, 2164–2170. Oregon Health and Science University. OHSU notice of privacy practices. Retrieved from http://www.ohsu.edu/xd/about/services/integrity/ips/npp.cfm Steinberg, M., & Rubin, E. (2009). The HIPAA Privacy Rule: Lacks patient benefit, impedes research growth. Association of Academic Health Centers (AAHC). Retrieved from http://http://www.aahcdc.org/Portals/41/Series/Issue- Briefs/HIPAA_Privacy_Rule_Impedes_Research_Growth.pdf?ver=2017-02-17-141347-363 Terry, N. (2014). Health privacy is difficult but not impossible in a post-HIPAA data-driven world. Chest, 146(3), 835–840. 26
  • 27. The Culture of Health Care Privacy, Confidentiality, and Security Lecture c This material was developed by Oregon Health & Science University, funded by the Department of Health and Human Services, Office of the National Coordinator for Health Information Technology under Award Number IU24OC000015. This material was updated in 2016 by Bellevue College under Award Number 90WT0002. 27

Hinweis der Redaktion

  1. No audio. Recording preparation.
  2. Welcome to The Culture of Health Care: Privacy, Confidentiality, and Security. This is Lecture c. The component, The Culture of Health Care, addresses job expectations in health care settings. It discusses how care is organized within a practice setting, privacy laws, and professional and ethical issues encountered in the workplace.
  3. The objectives for Privacy, Confidentiality, and Security are to: Define and discern the differences between privacy, confidentiality, and security Discuss methods for using information technology to protect privacy and confidentiality Describe and apply privacy, confidentiality, and security under the tenets of the HIPAA Privacy and Security rules Discuss the intersection of a patient’s right to privacy with the need to share and exchange patient information
  4. This lecture discusses the Health Insurance Portability and Accountability Act (HIPAA) [hip-uh] Privacy Rule, which was signed into effect in 2006. In 2008, the Genetic Information Nondiscrimination Act specifically addressed genetic information under the HIPAA Privacy Rule, prohibiting health plans from using or disclosing genetic information for underwriting purposes. The 2009 Health Information Technology for Economic and Clinical Health Act, or HITECH [high-tech] legislation, provided updates to the rules. Since the 2009 rule publication and HITECH, additional updates have been made through the federal rule-making process regarding the meaningful use program stages. In 2013, the HIPAA rule that focused on increasing the public’s privacy protections and rights regarding their health information was updated and strengthened the government’s ability to enforce the law regardless of where the information is held, whether by a health plan, a health care provider, or one of their business associates. There are also ongoing attempts to ensure that federal and state privacy laws are in agreement with each other. Aligning these laws is a significant work effort, since all state laws are not the same. The benefit of this effort results in not only protection of personal health information but also support in addressing the various issues involved in interstate commerce.
  5. There are many summaries available on the HIPAA rules, several of which are listed on this slide. The paper by ID Experts presents a relatively concise overview of the HIPAA omnibus law. BridgeFront focuses on some of the legal implications, and the Leyva [lay-vat] summary is focused more on the clinical side of the original law. The Health IT government website has many publicly available resources, such as “HIPAA and Health IT,” which contain information regarding the Privacy Rule and ways it facilitates electronic data exchange. This site also has a Security Information Series, which has resources designed for HIPAA-covered entities, including guidelines for implementation. The Health Information and Management Systems Society (HIMSS) has the Privacy and Security Toolkit, which contains an analysis of the HIPAA law as well as tools and resources for understanding and implementing various elements of the law. This toolkit, like many other industry resources, provides HIPAA information on how the rule applies to specific areas, such as mobile devices, health information exchange organizations, public health, and cloud computing. Many industry resources focus on a specific health care professional, such as physicians, nurses, business associates, and human resources, for example. The National Institutes of Health (NIH) provides information on the HIPAA Privacy Rule specifically for the research community. Many organizations, such as the American Health Information Management Association (AHIMA), offer online HIPAA privacy and security courses with some offering certification. The Department of Health and Human Services (HHS) offers publicly available materials, called “Helping Entities Implement Privacy and Security Protections,” to support providers with HIPAA employee training. In addition, HHS offers “HIPAA for Individuals,” which provides information and resources for U.S. citizens to assist them in understanding their rights under HIPAA.
  6. Those who work in a health care setting in the United States are probably familiar with the HIPAA Privacy Rule. Patients receiving care in the United States also are exposed to the HIPAA Privacy Rule. The HIPAA Privacy Rule applies to covered entities, which are essentially any entities that electronically bill or are involved in the billing process for patient care services. One category of covered entities is health care providers, such as clinicians, hospitals, and clinics. Another category is health plans, such as health maintenance organizations (HMOs), insurance companies, and others, including business associates. This rule also applies to health care clearinghouses that deal with sensitive health information usually concerning billing services. A key point about HIPAA that leads to a lot of misconceptions is that the HIPAA Privacy Rule doesn’t require patient authorization to disclose information for treatment, payments, or operations, sometimes called TPO [tee-pee-oh]. Probably the biggest misconception is that when a patient is transferred from one institution to another, the referring institution would be in violation of the HIPAA Privacy Rule by sending the patient’s information to the second institution. Not true! When a patient is transferred, it’s within the legal rights of everyone involved in the patient’s health care to disclose information to each other for the care of the patient.
  7. The Notice of Privacy Practices is essentially an oath of privacy. An interesting Web page devoted to oaths of privacy in health care notes that physicians have been taking privacy seriously for quite some time. The Hippocratic Oath, or the Oath of Hippocrates, developed in the fifth century BC, requires the physician to state, “All that may come to my knowledge in the exercise of my profession or outside of my profession or in daily commerce with men, which ought not to be spread abroad I will keep secret and never reveal.” Likewise, the Declaration of Geneva, usually considered to be the modern-day replacement of the Hippocratic Oath, states, “I will respect the secrets which are confided in me even after the patient has died.”
  8. What is covered by the HIPAA privacy regulations? The privacy regulations cover protected health information, or PHI [P-H-I]. This is information that is collected from the patient and created by a covered entity, such as a health care provider, clearinghouse, or health plan. It’s individually identifiable and electronically transmitted information. HIPAA regulations extend to covered entities and business associates of the covered entities. For example, if a business works with a health care institution for whom the HIPAA regulations apply, then those regulations apply to that business as well. De-identified information is not covered; issues with so-called de-identified information were discussed in a previous lecture. There are various levels of pre-emption: HIPAA trumps state law if state law is less protective of privacy and security, but state laws that go beyond the HIPAA protections are not nullified by HIPAA and must be followed.
  9. What types of identifiers fall under PHI? The HIPAA definition of PHI is broad and comprehensive. The regulations define nineteen different types of patient data that can be PHI. Obviously, this includes information such as name and address, but it also includes ZIP code, employer’s e-mail address and telephone numbers, photographic images, Social Security number, medical record number, and any web URLs associated with the patient. Finally, any other unique identifying number, characteristic, or code is also considered PHI.
  10. What are the key compliance areas for the HIPAA Privacy Rule? Health care organizations must post and inform patients of their Notice of Privacy Practices. HIPAA address issues related to authorization of the use of PHI. There are rules that apply to business associates and subcontractors. There are allowable disclosures, rules around marketing, and rules around physician and staff training. Finally, there are penalties for noncompliance with the privacy rules. These areas are discussed in the slides that follow.
  11. One of the cornerstones of the HIPAA Privacy Rule is the Notice of Privacy Practices, or NPP [N-P-P]. People who have obtained health care in the United States in the last decade or so will have come across an NPP and probably had to sign it. The NPP states what the patient rights are. Under the HIPAA Privacy Rule, the patient has the right to know the privacy practices of a covered entity, such as a physician practice or hospital. The notice should contain the uses and disclosures of personal health information, including those that extend beyond TPO. The NPP should also describe individual rights as well as the legal duties of the covered entities. Part of the problem with these documents is that their readability is comparable to what is seen in medical journal articles. In other words, they are highly technical and are probably beyond the readability of eighty percent of the U.S. adult population. The 2013 HIPAA update strengthened the patient’s rights with increased protection and control of personal health information. There are many publicly available industry resources to assist in compliance with NPP requirements, including resources and tools available on the HHS website “Notice of Privacy Practices for Protected Health Information.”
  12. Some other aspects of privacy practices are that they must be written in plain language, although later slides will show that this is somewhat of an issue. Practices and organizations have to state that they reserve the right to change the NPP. There must be some sort of complaint process by which a patient can challenge whether the privacy practices have been inappropriate. Every practice organization must designate a privacy official, essentially a chief privacy officer. In smaller practices, this role may be filled by the office manager or perhaps one of the physicians in the practice. Listed on this slide is the link to the Oregon Health & Science University’s NPP, which has been translated into numerous languages. There are many publicly available resources that provide NPP template forms and tools.
  13. The HIPAA Privacy Rule requires that an authorization be obtained for the use of PHI for purposes other than for TPO. The covered entity is not allowed to condition treatments of the patient on whether or not an individual gives authorization for use of PHI beyond TPO. When covered entities release PHI, reasonable safeguards must be in place to limit the use to the minimum necessary standard, as defined by the statute from the HHS Office for Civil Rights.
  14. Authorizations must include the following: The names of authorized persons making use of or disclosing the information The description of the information An expiration date so the authorization does not last into perpetuity Instructions on the patient’s right to revoke the authorization and how to do so A statement of the specific purpose of use or disclosure, and A signature and date by the patient Additional information may be required for designated restricted or sensitive health information, as described by federal and state law, such as with behavioral health and mental health information and records, developmental disability patient health information, and records on alcohol or other substance abuse patient health information or records.
  15. HIPAA defines business associates and sets rules for their interactions with covered entities. These have been strengthened or updated since the original rule. A “business associate” is [quote] “a person or entity that performs certain functions or activities that involve the use or disclosure of protected health information on behalf of, or in providing services to, a covered entity.” [end quote] Business associates are directly accountable to HHS for compliance and are subject to breach notification rules. Covered entities must have signed agreements with all of their business associates. Examples of a provider’s business associates include billing companies, vendors, software vendors, personal health record vendors, health information exchange organizations, e-prescribing gateways, and other persons or entities that provide data transmission services with respect to PHI to a covered entity and that require access on a routine basis to such PHI. Also included is any subcontractor that creates, receives, maintains, or transmits PHI on behalf of the business associate, such as those involved in claims processing and administration, data analysis, utilization review, quality assurance, patient safety activities, and benefits management. In the original HIPAA legislation, covered entities were only required to obtain what was called satisfactory assurances of privacy protections from business associates. Business associates are now required to meet the same rules that covered entities must meet. For example, each business associate must sign an agreement with the covered entity, stating that it will adhere to all of the HIPAA privacy rules. When business associates undergo a breach of information, the associated subcontractors are also subject to the same HIPAA breach notification rules that may include investigation and remediation.
  16. What are some of the allowable disclosures outside of TPO? One area is research. HHS has a publication that describes what is and isn’t allowed under the HIPAA Privacy Rule. In general, authorization by the patient is required, and the NPP usually contains a clause that allows information to be used for research purposes. However, some waivers can be granted without the patient’s explicit approval by either an institutional review board, also known as an IRB [I-R-B], or a privacy board. The Privacy Rule states that when this authorization waiver is used, there must be no more than a minimal risk of disclosure of information and that the research could not be practically conducted without the waiver and without access to personal health information. Some public health disclosures are allowed so that information gathered by public health agencies can be released. Information in specific areas such as child abuse, exposure to communicable diseases, and workforce surveillance can also be disclosed. Some other areas where disclosure is permitted include information related to law enforcement, issues related to decedents’ [dih-seed-ents] and cadaveric [ka-duh-vehr-ihk] tissue donation.
  17. Using health information for marketing, defined in HIPAA as a communication about a product or service that encourages recipients of the communication to purchase or use the product or service, requires authorization of the individual. Activities such as a health care provider recommending a treatment to a patient or encouraging a patient to keep an appointment or to refill a prescription have been defined as outside the scope of marketing for providers. So when a provider recommends a treatment, it’s not considered to be marketing; likewise, notifying patients about appointments and prescription refills is not marketing.
  18. Another aspect of the HIPAA privacy regulations is physician and staff training, which has been a substantial expense to health care organizations. The regulation states that practices and organizations must designate a privacy officer, develop policies and procedures, provide privacy training to the workforce, and develop a system of sanctions for employees who violate the privacy law. There’s sometimes frustration when individuals have to complete HIPAA training at each and every organization they are associated with. For example, a researcher would have to complete similar HIPAA training at all of the institutions that he or she collaborates with, resulting in a lot of repetition.
  19. Obviously, the HIPAA Privacy Rule must have teeth. In fact, the original HIPAA Privacy Rule was criticized for the relatively modest penalties and minimal prosecutions that took place when the rule was launched. HIPAA has a tiered penalty structure that is administered in line with the nature and circumstances of the violation. This ranges from a violation in which the individual did not know (and by exercising reasonable diligence would not have known) that HIPAA was violated all the way to the extreme circumstance in which a HIPAA violation resulted from willful neglect and with no correction implemented. The assessed penalty relates to the level of culpability characterizing the violation, which can range from twenty-five-thousand dollars up to a maximum penalty of one-point-five million dollars. If multiple HIPAA violations occur, penalties could surpass one-point-five million dollars. The OCR enforces the privacy standards, while the Centers for Medicare & Medicaid Services (CMS) enforces both the transaction and code set standards and the security standards of the HIPAA regulation.
  20. One question that’s often asked is whether the HIPAA Privacy Rule truly protects privacy. There has been a lot of work on different aspects of the HIPAA Privacy Rule: how well it works, how it can be strengthened, and so forth. Reviews in 2000, after the privacy rule was launched, by the Government Accountability Office, and in 2007 by the National Committee on Vital and Health Statistics (NCVHS), found that adherence was actually less problematic than many had anticipated. The HIPAA Privacy Rule has now become part of health care delivery. One area where there have been many concerns is in the impact of HIPAA on clinical research. Some studies have documented, for example, that finding and accessing patients to participate in research has become more difficult. Researchers report more difficulty in doing their work, and at the same time, they report that they don’t believe privacy is being substantially enhanced. This concern has led some organizations, in particular, the Association of Academic Health Centers and the Institute of Medicine, to argue for revisions to the HIPAA Privacy Rule to make research easier. There also have been some assessments of the HIPAA Privacy Rule with regard to public health. In general, public health authorities are relatively satisfied with HIPAA and don’t find it too onerous [on-er-uhs]. One approach that has been advocated is for less emphasis on patient consent and more emphasis on a framework that makes it easier to share appropriate TPO, with some modifications of how operations is defined, coupled with more rigorous restrictions on other uses, particularly marketing.
  21. There are other modifications to the HIPAA Privacy Rule under the HITECH legislation. One area concerns breach notification. Obviously, patients must be informed, but when the breach exceeds five hundred patients, the OCR as well as the local media or local press, must be notified. In fact, the OCR maintains a web page that lists all breaches of more than five hundred patients, which can be accessed through the URL on this slide. There are also some modifications that allow patients to put more restrictions on disclosures. For example, when patients pay for medical care out-of-pocket instead of through their insurance, they can stipulate that information not be sent to payers. There are also stricter rules for appropriate disclosures of TPO. These disclosures must be tracked and records maintained for three years. In addition, covered entities that have electronic health records have to either provide or, if the patient requests, transmit PHI in electronic format as the patient directs. Finally, one other clause allows patients to opt out of fundraising appeals.
  22. This concludes Lecture c of Privacy, Confidentiality, and Security. In summary, the HIPAA Privacy Rule restricts disclosure of information not authorized by a patient. It has been enhanced by the HITECH Act. It’s important to remember that patient authorization for disclosure is not required for treatment, payment, or operations. Finally, the HIPAA Privacy Rule defines covered entities and business associates of those entities that also must adhere to the privacy regulations.
  23. No audio.
  24. No audio.
  25. No audio.
  26. No audio.
  27. No audio.