SlideShare ist ein Scribd-Unternehmen logo
1 von 63
HIPAA 101
Privacy and Security
Training
Copyright 2011 The Regents of University of California
All Rights Reserved
The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is
making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
Privacy and Security Training
Privacy and Security for New UCSF Workforce
•
•
•
•
•
•
•
•

Faculty
Post Docs
Residents / Fellows
Staff
Students
Trainees
Volunteers
Contractors / Vendors
Copyright 2011 The Regents of University of California
All Rights Reserved
The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is
making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
Course Objectives
Privacy and Security Training explains:
• The requirements of the federal HIPAA/HITECH
regulations, state privacy laws, and University policies and
procedures that protect the privacy and security of
confidential data
• How these affect you and your job
• What information must be protected
• How you can protect confidential and sensitive information
• Your responsibilities for good computer practices
• How to report privacy breaches and security incidents
Copyright 2011 The Regents of University of California
All Rights Reserved
The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is
making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
Privacy and Security
Laws and University Policies
This section explains the following laws and policies:
Federal HIPAA
Federal HITECH Act
California State Medical
Information Laws
UC & UCSF policies and
procedures
Fines and penalties
Copyright 2011 The Regents of University of California
All Rights Reserved
The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is
making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
What is HIPAA?
The Health Insurance Portability and Accountability Act
(HIPAA) is a federal law that specifies administrative
simplification provisions that:
• Protect the privacy of patient information
• Provide for electronic and physical
security of patient health information
• Require “minimum necessary” use and
disclosure
• Specify patient rights to approve the
access and use of their medical
information
Copyright 2011 The Regents of University of California
All Rights Reserved
The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is
making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
HITECH Act Updated HIPAA in 2009
As part of the American Recovery and Reinvestment Act
of 2009, the Health Information Technology for Economic
and Clinical Health (HITECH) Act updated federal HIPAA
privacy and security standards.
The updates include:
• Breach notification requirements
• Fine and penalty increases for privacy violations
• Right to request copies of the electronic health care record in
electronic format
• Mandates that Business Associates are civilly and criminally
liable for privacy and security violations
Copyright 2011 The Regents of University of California
All Rights Reserved
The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is
making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
California Medical Information
Privacy Laws
• Apply to individuals as well as institutions
• Unauthorized access includes the inappropriate review or viewing
of patient medical information without a direct need for diagnosis,
treatment or other lawful use
• Licensed facilities, like UCSF Medical Center, are required to
report incidents of unauthorized access, use, or disclosure of PHI
to the California Department of Public Health, and to the affected
patient within 5 business days after breach detection
• When you suspect or know of a breach you must report it to the
Privacy Office immediately
 Medical Center employees must also submit an Incident
Report
Copyright 2011 The Regents of University of California
All Rights Reserved
The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is
making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
Privacy is bigger than HIPAA
Other Federal Laws
In addition to HIPAA, there are other federal laws which govern the release of information,
mandate that information be protected, and in some cases require that individuals be granted
certain rights relative to control of and access of their information.
•The Medicare Conditions of Participation require that hospitals promote each patient’s rights, including
privacy (42 CFR Section 482.13).
•The Federal Trade Commission (FTC) charged with protecting consumers requires banking and other
industries to implement “red flag” standards (12 CFR Part 681) to detect and prevent identity theft related to
customer and service accounts. These red flag rules extend to Health Care Institutions.
•The Family Education Rights and Privacy Act (FERPA) governs the protection of education records which
include student health records (20 USC 1232g). HIPAA specifically exempts individually identifiable health
information in education records. As FERPA records are exempt from HIPAA, all releases from education
records must be in accordance with FERPA regulations.
•Federal Department of Health and Human Services (HHS) as well as multiple federal agencies require the
protection of the privacy and confidentiality of participants in research clinical trails.

Copyright 2011 The Regents of University of California
All Rights Reserved
The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is
making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
Privacy is bigger than HIPAA
California State Laws
Confidentiality of Medical Information Act (CMIA) (Civil Code Section 56 et seq.) requires that:
•
•
•

Confidentiality of Medical Information be protected and establishes protections
against disclosures of Individually Identifiable Medical Information
Institutions notify California residents of breaches of electronic social security
number, access codes to financial accounts, medical, and insurance information
Healthcare institutions implement safeguards to protect the privacy and confidentiality
of Medical Information

Civil Code Sections 1785.11.2, 1798.29, 1798.82 and Health & Safety Code Section 130200
Health & Safety Code Section 1280.15 mandates that licensed clinics and health facilities
report to both the Department of Public Health and the affected patient(s) any unlawful or
unauthorized access to, or use or disclosure of, a patient’s Medical Information no later than 5
calendar days after the breach is detected.
Cont’d…
Copyright 2011 The Regents of University of California
All Rights Reserved
The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is
making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
Privacy is bigger than HIPAA
California State Laws
Lanterman-Petris-Short (LPS) (Welfare and Institutions Code Section 5328 et seq.)
provides special confidentiality protections for medical records containing mental health or
development disabilities information.
Title 22, California Code of Regulations, Section 70707(b)(8), requires acute care hospitals
to protect patient rights to the confidential treatment of all information related to their care
and stay at the hospital.

Copyright 2011 The Regents of University of California
All Rights Reserved
The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is
making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
University of California and UCSF
• UC and UCSF have policies and procedures to protect the
privacy and security of information
• As a UCSF workforce member, you are responsible to follow
these policies and procedures to protect the privacy and
security of information
• Ask your Supervisor or Manager for guidance
• Remember that privacy applies to ALL verbal, written, and
electronic information

Copyright 2011 The Regents of University of California
All Rights Reserved
The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is
making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
Fines and Penalties
Privacy violations may carry penalties under federal
HIPAA/HITECH, state privacy laws, and UC policies:
• HIPAA Criminal Penalties
 $50,000 - $1,500,000 fines
 Imprisonment up to 10 years

• HIPAA Civil Penalties
 $100 - $25,000 / year fines
 More fines if multiple year violations

• State Laws
 Fines and penalties apply to individuals as well as health care providers, up to a
maximum of $250,000; may impact your professional license
 Imprisonment up to 10 years

• UCSF corrective and disciplinary actions
 Up to and including loss of privileges and termination of employment
Copyright 2011 The Regents of University of California
All Rights Reserved
The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is
making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
How the Laws Affect You and Your Job
This section explains:
• How the privacy laws apply to you
• Who uses PHI at UCSF

Copyright 2011 The Regents of University of California
All Rights Reserved
The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is
making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
How the HIPAA Laws Apply to You
HIPAA requires that UCSF train
all workforce members about
the University’s HIPAA policies
and specific procedures which
may affect the work you do.
These rules apply to you when
you look at, use, or share
Protected Health Information
(PHI).

Copyright 2011 The Regents of University of California
All Rights Reserved
The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is
making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
Who Uses PHI at UCSF?
•

Anyone who works with or may view health, financial, or confidential
information with HIPAA protected health identifiers

•

Everyone who uses a computer or electronic device which stores
and/or transmits information

• The following workforce members:
o All Medical Center staff
o Faculty Group Practice staff
o Schools of Medicine, Nursing, Dentistry: staff
and faculty
o Campus staff who work in clinical areas
o Administrative staff with access to PHI
o Volunteers
o Students who work with patients
o Researchers and staff investigators
o Accounting and payroll staff
o Almost EVERYONE, at one time or another

Copyright 2011 The Regents of University of California
All Rights Reserved
The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is
making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
Protected Health Information (PHI)
This section explains:
•
•
•
•
•

What information must be protected
PHI identifiers
UCSF’s usage or disclosure of PHI
The Notice of Privacy Practices (NOPP) for PHI
Purposes other than Treatment, Payment, or
Operations (TPO)
• Examples of TPO
• Exceptions to the “Minimum Necessary” standard
• When you should view, use, or share PHI
Copyright 2011 The Regents of University of California
All Rights Reserved
The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is
making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
What Information Must Be Protected?
You must protect an individual’s PHI which is collected
or created as a consequence of a health care provision.
• PHI:
 Is information related to a patient’s past, present or future
physical and/or mental health or condition
 Can be in any form: written, spoken, or electronic (including
video, photographs, and x-rays)
 Includes at least one of the 18 personal identifiers in
association with health information

• These rules apply to you when you view, use, and share PHI
• Any health information with identifiers (on the following page)
is Protected Health Information (PHI)

Copyright 2011 The Regents of University of California
All Rights Reserved
The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is
making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
Protected Health Information (PHI)
Identifiers
The 18 Identifiers defined by HIPAA are:












Name
Postal address
All elements of dates
except year
Telephone number
Fax number
Email address
URL address
IP address
Social security number
Account numbers
License numbers

 Medical record number
 Health plan beneficiary #
 Device identifiers and their





serial numbers
Vehicle identifiers and serial
number
Biometric identifiers
(finger and voice prints)
Full face photos and other
comparable images
Any other unique
identifying number, code, or
characteristic

Copyright 2011 The Regents of University of California
All Rights Reserved
The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is
making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
UCSF’s Use or Disclosure of PHI
In order for UCSF to use or disclose PHI:
•UCSF must give each patient a Notice of Privacy
Practices that:
 Describes how UCSF may use and disclose the
patient’s PHI
 Advises the patient of his/her privacy rights

•The University must attempt to obtain the patient’s
signature acknowledging receipt of the Notice, except
in emergency situations. If a signature is not
obtained, the University must document the reason
why it was not.

Copyright 2011 The Regents of University of California
All Rights Reserved
The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is
making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
Notice of Privacy Practices for PHI
The Notice of Privacy Practices (NOPP) allows
PHI to be used and disclosed for purposes of TPO
• Treatment (T), Payment (P), Operations (O)
 TPO includes teaching, medical staff/peer review, legal, auditing,
customer service, business management, and releases mandated
by law
 UCSF must have a Business Associate Agreement (BAA) with
vendors who will use PHI when providing a service to UCSF

Copyright 2011 The Regents of University of California
All Rights Reserved
The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is
making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
For Purposes Other Than TPO
Unless required or permitted by law, UCSF must obtain written
authorization from the patient to use, disclose, or access patient
information.
• Patient Authorization allows UCSF to disclose information for purposes not related
to treatment, payment, or operations
•For human subjects research, additional rules and training apply (see Committee
for Human Research website for guidance at
http://www.research.ucsf.edu/chr/HIPAA/chrHIPAA.asp)
• PHI may not be accessed for human subjects research unless
•
•

The Committee for Human Research (CHR) has approved the research
and
BOTH Informed Consent and HIPAA Authorization have been obtained from the
subject, OR CHR has approved a Waiver of Informed Consent and HIPAA
Authorization

NOTE: if you obtain or use PHI for research purposes with only an Informed Consent but
without a HIPAA Authorization, it is considered an unauthorized disclosure under
HIPAA.
Copyright 2011 The Regents of University of California
All Rights Reserved
The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is
making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
For Purposes Other Than TPO
If you are involved in fundraising, additional rules apply:
•

UCSF Privacy and Confidentiality Handbook for guidance at
http://hipaa.ucsf.edu/Privacy%20Handbook.pdf

•

Policy 450-10 Authority to Solicit Funds through Gifts, Private Grants
and Events at http://policies.ucsf.edu
 PHI may not be accessed for fundraising without prior written
authorization from the patient
 For use or disclosure of PHI, an Authorization for Fundraising is
required. Only a patient’s healthcare provider may request that the
patient sign the Authorization. Authorizations for fundraising must be
forwarded to UCSF’s Development and Alumni Relations (UDAR) office.
 UCSF policy requires providers, departments, divisions and all other
UCSF entities to coordinate with UDAR for all fundraising efforts that
target patients
Copyright 2011 The Regents of University of California
All Rights Reserved
The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is
making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
Examples of TPO
• The patient’s referring physician calls and asks for a
copy of the patient’s recent exam at UCSF
(Treatment)
• A patient’s insurance company calls and requests a
copy of the patient’s medical record for a specific
service date (Payment)
• The Quality Improvement office calls and asks for a
copy of an operative report (Health Care
Operations)
For these TPO purposes, patient information may be
provided

Copyright 2011 The Regents of University of California
All Rights Reserved
The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is
making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
Except for Treatment, the Minimum
Necessary Standard Applies
• For patient care and treatment, HIPAA does
not impose restrictions on use and disclosure
of PHI by health care providers
 Exceptions: psychotherapy information, HIV test
results, and substance abuse information

• For anything else, HIPAA requires users to
access the minimum amount of information
necessary to perform their duties.
 Example: a billing clerk may need to know what
laboratory test was done, but not the result

Copyright 2011 The Regents of University of California
All Rights Reserved
The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is
making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
When Should You?

• View PHI
• Use PHI
• Share PHI

Copyright 2011 The Regents of University of California
All Rights Reserved
The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is
making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
Remember
• Use information only when necessary to perform your
job duties
• Use only the minimum necessary to perform your job
duties
• Follow UCSF Medical Center or UCSF campus policies
and procedures for information confidentiality and
security
• Ask your supervisor for your department’s privacy and
security procedures
Copyright 2011 The Regents of University of California
All Rights Reserved
The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is
making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
Scenario 1
I do not work with patients or have access to medical
records, however I see patients pass by my desk in the
clinic. Can I talk about the patients with my coworkers,
family and friends even if it has nothing to do with my
job?
A. You may not discuss any patient information with anyone
unless required for your job
B. You may only talk about the patient with our coworkers
C. You may only talk about the patient with your family and
friends

Copyright 2011 The Regents of University of California
All Rights Reserved
The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is
making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
Scenario 1 - Answer

The correct answer is A.
Information can only be used as needed for your job.
A. You may not discuss any patient information with
anyone unless required for your job
B. You may only talk about the patient with our coworkers
C. You may only talk about the patient with your family
and friends

Copyright 2011 The Regents of University of California
All Rights Reserved
The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is
making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
Scenario 2
I work in Admitting and my friend, who
works in the Emergency Department, told
me that she just saw a famous movie star
get on the elevator. My friend read in the
paper that the movie star has cancer and
asked me to find out what floor that star is
on. Can I give my friend the information?
A. It is okay as I am only looking up her location, not her medical
condition
B. I already have approval to access patient clinical systems, so
no one will know that I accessed it
C. It is not necessary for my job, so I would be violating the
patient’s privacy by checking on her location and by sharing
this information with my friend
Copyright 2011 The Regents of University of California
All Rights Reserved
The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is
making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
Scenario 2 - Answer
The correct answer is C.
It is not part of your or your friend’s job,
even if you are a system user. Your
access to the record will automatically
be recorded and can be tracked. Both
you and your friend are not protecting
the privacy of this patient. There could
be serious consequences to your
employment.
A. It is okay as I am only looking her location, not her medical
condition
B. I already have approval to access patient clinical systems, so no
one will know that I access it
C. It is not necessary for my job, so I would be violating the
patient’s privacy by checking on her location and by sharing
this information with my friend
Copyright 2011 The Regents of University of California
All Rights Reserved
The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is
making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
Scenario 3
As a file clerk, it is my job to see PHI, but
while opening lab reports, I saw my
manager’s pregnancy test results. Her
pregnancy test was positive! I congratulated
her, but found out that I was the first person
to tell her. Did I do the right thing?
A. It is okay as it was part of my job to see PHI
B. She is an employee at UCSF, so it is okay to look at other UCSF
employee records
C. I should not have used the information as it was not my job to
discuss lab results, to provide a diagnosis, or to use her
information outside of my job duties

Copyright 2011 The Regents of University of California
All Rights Reserved
The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is
making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
Scenario 3 - Answer
The correct answer is C.
There was impermissible disclosure of her information.
UCSF employees can also be patients. As such, they
have all the same rights to privacy of their information as
does any other patient. This was also a violation of UCSF
policy, which could impact your employment.
A. It is okay as it was part of my job to see PHI
B. She is an employee at UCSF, so it is okay to look at other
UCSF employee records
C. I should not have used the information as it was not my
job to discuss lab results, to provide a diagnosis, or to
use her information outside of my job duties

Copyright 2011 The Regents of University of California
All Rights Reserved
The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is
making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
Scenario 4
Because I have access to confidential
patient information as part of my job,
I can look up anybody’s record, even
if they are not my patient, as long as I
keep the information to myself.
A. True, as long as I do not share this information
B. I can only look at records when it is required by my job
C. I can access hard copy medical charts, but not
electronic records, anytime I want

Copyright 2011 The Regents of University of California
All Rights Reserved
The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is
making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
Scenario 4 - Answer
The correct Answer is B.
It is acceptable only when it is necessary
for your job and only the minimum
information necessary to do your job.
Idle curiosity can jeopardize the patient’s
privacy and your employment.
A. True, as long as I do not share this information
B. I can only look at records when it is required by my job
C. I can access hard copy medical charts, but not electronic
records anytime I want

Copyright 2011 The Regents of University of California
All Rights Reserved
The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is
making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
Protecting Privacy
This Section Explains:
•
•
•
•
•

Verbal exchanges
Knowing where you left your paperwork
Disposal of paper documents
Security of Electronic Patient Information (ePHI)
Privacy breach from lost, stolen, or misdirected
information
• Incidents from any format of information

Copyright 2011 The Regents of University of California
All Rights Reserved
The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is
making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
Verbal Exchanges
• Patients may see normal clinical
operations as violating their privacy
• Be aware of your surroundings when
talking
• Do not leave PHI on answering
machines
• Ask yourself, “What if it was my
information being discussed like
this?”

Copyright 2011 The Regents of University of California
All Rights Reserved
The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is
making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
Know Where You Left Your Paperwork
• Check printers, faxes, copier machines
when you are done using them
• Ensure paper charts are returned to
applicable areas in nursing stations,
medical records, or designated file rooms
• Do not leave hard copies of PHI laying on
your desk; lock it up in your desk at the
end of the day
• Seal envelopes well when mailing

Copyright 2011 The Regents of University of California
All Rights Reserved
The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is
making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
Disposal of Paper Documents
• Shred or destroy PHI before throwing it
away
• Dispose of paper and other records with
PHI in secured shredding bins.
Recycling and Trash bins are NOT
secure.
• Shredding bins work best when papers
are put inside the bins. When papers are
left outside the bin, they are not secured
from:
 Daily gossip
 Daily trash
 The public
Copyright 2011 The Regents of University of California
All Rights Reserved
The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is
making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
Security of Electronic Patient
Information (ePHI)
Good security standards follow the “90/10” Rule:
• 10% of security safeguards are
technical
• 90% of security safeguards rely on the
computer user (YOU) to adhere to good
computer practices

Copyright 2011 The Regents of University of California
All Rights Reserved
The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is
making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
Privacy Breach from Lost, Stolen, or
Misdirected Information
A privacy breach can occur when information is:
• Physically lost or stolen
 Paper copies, films, tapes, electronic devices
 Anytime, anywhere - even while on public transportation,
crossing the street, in the building, in your office

• Misdirected to others outside of UCSF
 Verbal messages sent to or left on the wrong voicemail or sent
to or left for the wrong person
 Mislabeled mail, misdirected email
 Wrong fax number, wrong phone number
 Placed on UCSF intranet, internet, websites, Facebook, Twitter
 Not using UCSF’s secured email tool

Copyright 2011 The Regents of University of California
All Rights Reserved
The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is
making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
Examples of Privacy Breaches
•

Talking in public areas, talking too loudly, talking to the
wrong person

•

Lost/stolen or improperly disposed of paper, mail, films,
notebooks

•

Lost/stolen laptops, PDAs, cell phones, media devices
(video and audio recordings)

•

Lost/stolen zip disks, CDs, flash drives, memory drives

•

Hacking of unprotected computer systems

•

Email or faxes sent to the wrong address, wrong person, or
wrong number

•

User not logging off of computer systems, allowing others
to access their computer or system
Copyright 2011 The Regents of University of California
All Rights Reserved
The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is
making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
Scenario 5
I called a patient’s phone number
and left a voice mail for Mr. John
Smith to contact UCSF regarding
his scheduled thyroid surgery. Was
this a privacy breach?
A. No, the patient provided this phone number
B. Yes, I stated his name and medical procedure
C. No, I did not state the medical reason for the surgery

Copyright 2011 The Regents of University of California
All Rights Reserved
The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is
making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
Scenario 5 - Answer
The correct answer is B.
Patient name in conjunction with any medical
information constitutes PHI. You do not know
who will hear the message; the patient may not
have told his family, friend or roommate. It is
best practice to leave the minimum amount of
information needed: your name, phone
number, and that you are from UCSF. Never
leave PHI on an answering machine. Ask your
supervisor for the voice mail procedure in your
area.
A. No, the patient provided this phone number
B. Yes, I stated his name and medical procedure
C. No, I did not state the medical reason for the surgery
Copyright 2011 The Regents of University of California
All Rights Reserved
The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is
making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
Your Responsibilities for Good
Computing Practice
This section explains:
• Computer security
• Protecting portable devices
• Safe emailing
• Additional security precautions

Copyright 2011 The Regents of University of California
All Rights Reserved
The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is
making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
Computer Security
•

Ensure your computer and data are physically secured by using
lockdown cables, locked drawers, placement in a secured area, etc.

•

Create a strong password and do not share your username or
password with anyone

•

Log off your computer terminal when you are done, or even if you
walk away for a few moments

•

Ensure information on computer screens is not visible to passersby
 Use a privacy screen
 Lock your PC by using the keyboard command Ctrl + Alt + Delete
 Use a password to start up or wake-up your computer

•

Ensure your system has anti-virus and all necessary security
patches and updates

•

UCSF IT website: http://it.ucsfmedicalcenter.org
Copyright 2011 The Regents of University of California
All Rights Reserved
The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is
making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
Portable Device Security Tips
•

Always encrypt portable devices and media with
confidential information on them (laptops, flash drives,
memory sticks, external drives, CDs, etc.)

•

Encryption must be an approved UCSF data encryption
solution
 Check with the IT department. A UCSF Medical Center or
Campus owned device may have already been encrypted
for you.
 Purchase only electronic devices and media which can be
encrypted. See UCSF OAAIS Best Practices staff website:
http://its.ucsf.edu/

Best Practice: Do not keep confidential data on portable devices
unless absolutely necessary. And if necessary, the information
must be encrypted.

Copyright 2011 The Regents of University of California
All Rights Reserved
The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is
making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
How to Send UCSF Emails Securely
• When using either the School of Medicine,
Medical Center or Campus email, you can
secure your message by using one of the
following words in the subject line:
 ePHI:
 PHI:
 Secure:

• Detailed instructions are available at:
 Medical Center Information Technology
http://it.ucsfmedicalcenter.org/secure_email
 School of Medicine Information Service Unit (ISU)
http://secureemail.ucsfmedicalcenter.org
 Campus IT Security
http://security.ucsf.edu
Copyright 2011 The Regents of University of California
All Rights Reserved
The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is
making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
Additional Security Precautions
• Make sure your computer has anti-virus and all necessary
security patches. UCSF Medical Center IT automatically
updates these weekly. Do not interrupt these updates! You
can continue to work while they are being installed.
• Do not install unknown or unsolicited programs
• Practice Safe Emailing
 Do not open, forward, or reply to suspicious emails
 Do not open suspicious email attachments or click on
unknown website addresses
 NEVER provide your username and password to an email
request
 Delete spam and empty the “Deleted Items” folder
 Use a secure email solution whenever sending email
outside UCSF
• It is your responsibility when communicating to send all PHI
securely
Copyright 2011 The Regents of University of California
All Rights Reserved
The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is
making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
Scenario 6
A physician is very busy and asks
you to log into the clinical
information system using his user ID
and password to retrieve some
patient reports. What should you do?
A. It is a physician, so it is okay to do this
B. Ignore the request and hope he forgets
C. Decline the request and refer him to the UCSF
information Security Policies
D. None of the above
Copyright 2011 The Regents of University of California
All Rights Reserved
The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is
making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
Scenario 6 - Answer
The correct answer is C.
Always login under your own user ID
and password. If you do not have
system owner permission to access the
system, then do not access the system.
This would have been a violation of
privacy and security policies.

A. It is a physician, so it is okay to do this
B. Ignore the request and hope she/he forgets
C. Decline the request and refer them to the UCSF
information Security Policies
D. None of the above
Copyright 2011 The Regents of University of California
All Rights Reserved
The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is
making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
Scenario 7
As part of your job, you need to use a
laptop as you work at various UCSF
sites. You have patient emails,
addresses, and medical information
files on the laptop. What is the best
way to protect this device?
A. The information on my portable device is encrypted, I use a
complex password, and I physically secure the device when
leaving it unattended
B. I only need a complex password to secure the laptop
C. It is secured as I use a complex password and when
unattended, I always lock it up in the trunk of my car
D. None of the above
Copyright 2011 The Regents of University of California
All Rights Reserved
The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is
making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
Scenario 7- Answer
The correct answer is A.
Your laptop must be encrypted if it contains UCSF
patient information or other sensitive confidential
information. Password protection by itself is not
enough but you do need to use complex
passwords for the device and physically secure it
when unattended. Unencrypted devices are
considered unsecured in the event of a loss or
theft by federal and state privacy laws and
therefore reportable to federal and state agencies!
A.
B.
C.
D.

The information on my portable device is encrypted, I use a complex
password, and I physically secure the device when leaving it
unattended
I only need a complex password to secure the laptop
It is secured as I use a complex password and when unattended, I always
lock it up in the trunk of my car
None of the above
Copyright 2011 The Regents of University of California
All Rights Reserved
The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is
making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
Question 1
Which workstation security safeguards are you responsible
for using and/or protecting?
A.
B.
C.
D.

Your User ID
Your Password
Logging out of programs that access PHI when not in use
All of the above

Copyright 2011 The Regents of University of California
All Rights Reserved
The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is
making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
Question 1 - Answer
The correct answer is D.
Always log off programs and always
protect your user ID and password.
Never share these with anyone.
A.
B.
C.
D.

Your User ID
Your Password
Logging out of programs that access PHI when not in use
All of the above

Copyright 2011 The Regents of University of California
All Rights Reserved
The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is
making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
Reporting Privacy Breaches and
Security Incidents
This section explains:
• How to report privacy breaches
• How to report security breaches
• The importance of immediately alerting known
or suspected incidents
• Where resources for privacy and security can
be found

Copyright 2011 The Regents of University of California
All Rights Reserved
The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is
making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
How to Report Privacy Breaches
Immediately report any known or suspected privacy
breaches (such as paper, conversations, suspected
unauthorized or inappropriate access or use of PHI)
to the Privacy Office at (415) 353-2750.

Copyright 2011 The Regents of University of California
All Rights Reserved
The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is
making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
How to Report Security Incidents
• Report lost or stolen laptops, Blackberries, PDAs, cell
phones, and flash drives immediately to the UCSF Police
Department at (415) 476-1414
 Immediately report any unusual or suspected information
security incidents to your Supervisor and/or Computing Support
Coordinator, including but not limited to the loss and/or theft of
any form of PHI (paper, films, etc.) as well as unusual computer
activity

• If no one is available to receive your report, contact
Customer Support at (415) 514-4100
• You can also go to the UCSF website
 Web: http://security.ucsf.edu/

Copyright 2011 The Regents of University of California
All Rights Reserved
The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is
making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
Importance of Immediately Alerting
Known or Suspected Incidents
State law requires that
unauthorized access, use or
disclosure of patient medical
information be reported within
5 working days of detection of
the breach to the CA
Department of Public Health,
and the affected patient(s) or
their legal representative.

Copyright 2011 The Regents of University of California
All Rights Reserved
The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is
making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
Remember
To the patient, ALL information is private.
• This includes a patient’s:
 Personal information
 Financial information
 Medical information
 Protected Health Information
 Information in any format:
spoken, written, or electronic

Copyright 2011 The Regents of University of California
All Rights Reserved
The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is
making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
Resources for Privacy and Security
•

Your Supervisor/Manager

•

Your Department’s IT or CSC person

•

Privacy Office
 Contact Number: (415) 353-2750
 Chief Privacy Officer: Deborah Yano-Fong

•

UCSF Information Security Officer: David Rusting

•

UCSF Medical Center Information Security Officer: Jose Claudio

•

UCSF School of Medicine ISU Director: Opinder Bawa

•

Online Resources:





UCSF Privacy Website: http://hipaa.ucsf.edu
UCOP HIPAA Website: http://www.universityofcalifornia.edu/hipaa
HIPAA and Research Website: http://www.research.ucsf.edu/chr/index.asp
SATE Website: http://security.ucsf.edu

Copyright 2011 The Regents of University of California
All Rights Reserved
The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is
making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
Question 2
You can protect patient information by:
A.
B.
C.
D.
E.

Protecting verbal, written, and electronic information
Utilizing safe computing skills
Reporting suspected privacy and security incidents
Following University policies
All of the above

Copyright 2011 The Regents of University of California
All Rights Reserved
The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is
making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
Question 2 - Answer
The correct answer is E.
All of these actions helps to
protect the privacy and security of
patient information.
A.
B.
C.
D.
E.

Protecting verbal, written, and electronic information
Utilizing safe computing skills
Reporting suspected privacy and security incidents
Following University policies
All of the above
Copyright 2011 The Regents of University of California
All Rights Reserved
The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is
making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
Next Steps
Before completing and receiving credit for the
Privacy and Security Training for New UCSF
Employees, you MUST:
1. Read the Statement of Privacy Laws and University
Policy:

http://hipaa.ucsf.edu/education/downloads/ConfidentialityStatement.pdf

2. Understand the Acknowledgement of Responsibility
(Signature Required)
The Statement of Privacy Laws and University Policy can also be obtained from your
Supervisor. In order to record your completion of this training, please turn in the signed
copy of the “Acknowledgment of Responsibility” form to your Supervisor.

Copyright 2011 The Regents of University of California
All Rights Reserved
The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is
making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.

Weitere ähnliche Inhalte

Andere mochten auch

HIPAA Privacy Training by University of Hawaii
HIPAA Privacy Training by University of HawaiiHIPAA Privacy Training by University of Hawaii
HIPAA Privacy Training by University of HawaiiAtlantic Training, LLC.
 
HIPAA Training by Greater Baltimore Medical Center
HIPAA Training by Greater Baltimore Medical CenterHIPAA Training by Greater Baltimore Medical Center
HIPAA Training by Greater Baltimore Medical CenterAtlantic Training, LLC.
 
HIPAA Workforce Training by Wayne-Holmes Mental Health Recovery Board
HIPAA Workforce Training by Wayne-Holmes Mental Health Recovery BoardHIPAA Workforce Training by Wayne-Holmes Mental Health Recovery Board
HIPAA Workforce Training by Wayne-Holmes Mental Health Recovery BoardAtlantic Training, LLC.
 
Introduction to HIPAA for Healthcare Professionals by OUP
Introduction to HIPAA for Healthcare Professionals by OUPIntroduction to HIPAA for Healthcare Professionals by OUP
Introduction to HIPAA for Healthcare Professionals by OUPAtlantic Training, LLC.
 
Hazard Communication by Maine Dept. of Labor
Hazard Communication by Maine Dept. of LaborHazard Communication by Maine Dept. of Labor
Hazard Communication by Maine Dept. of LaborAtlantic Training, LLC.
 
Slips, Trips and Falls by Connecticut DOL
Slips, Trips and Falls by Connecticut DOLSlips, Trips and Falls by Connecticut DOL
Slips, Trips and Falls by Connecticut DOLAtlantic Training, LLC.
 
Hazard Communication Training by Maine Department of Labor
Hazard Communication Training by Maine Department of LaborHazard Communication Training by Maine Department of Labor
Hazard Communication Training by Maine Department of LaborAtlantic Training, LLC.
 
Preventing Slips, Trips and Falls in the Health Care Industry by GTRI
Preventing Slips, Trips and Falls in the Health Care Industry by GTRIPreventing Slips, Trips and Falls in the Health Care Industry by GTRI
Preventing Slips, Trips and Falls in the Health Care Industry by GTRIAtlantic Training, LLC.
 
Hazard Communication Training by Oklahoma State University
Hazard Communication Training by Oklahoma State UniversityHazard Communication Training by Oklahoma State University
Hazard Communication Training by Oklahoma State UniversityAtlantic Training, LLC.
 
The Control of Hazardous Energy by SAPPI
The Control of Hazardous Energy by SAPPIThe Control of Hazardous Energy by SAPPI
The Control of Hazardous Energy by SAPPIAtlantic Training, LLC.
 
Hazard Communication Training Program by MIOSHA
 Hazard Communication Training Program by MIOSHA Hazard Communication Training Program by MIOSHA
Hazard Communication Training Program by MIOSHAAtlantic Training, LLC.
 
Personal Protective Equipment Training by San Diego State University
Personal Protective Equipment Training by San Diego State UniversityPersonal Protective Equipment Training by San Diego State University
Personal Protective Equipment Training by San Diego State UniversityAtlantic Training, LLC.
 

Andere mochten auch (20)

HIPAA Privacy Training by University of Hawaii
HIPAA Privacy Training by University of HawaiiHIPAA Privacy Training by University of Hawaii
HIPAA Privacy Training by University of Hawaii
 
HIPAA Training by Greater Baltimore Medical Center
HIPAA Training by Greater Baltimore Medical CenterHIPAA Training by Greater Baltimore Medical Center
HIPAA Training by Greater Baltimore Medical Center
 
HIPAA Workforce Training by Wayne-Holmes Mental Health Recovery Board
HIPAA Workforce Training by Wayne-Holmes Mental Health Recovery BoardHIPAA Workforce Training by Wayne-Holmes Mental Health Recovery Board
HIPAA Workforce Training by Wayne-Holmes Mental Health Recovery Board
 
Introduction to HIPAA for Healthcare Professionals by OUP
Introduction to HIPAA for Healthcare Professionals by OUPIntroduction to HIPAA for Healthcare Professionals by OUP
Introduction to HIPAA for Healthcare Professionals by OUP
 
Basic HIPAA Training by CMU
Basic HIPAA Training by CMUBasic HIPAA Training by CMU
Basic HIPAA Training by CMU
 
Hazard Communication by Maine Dept. of Labor
Hazard Communication by Maine Dept. of LaborHazard Communication by Maine Dept. of Labor
Hazard Communication by Maine Dept. of Labor
 
Slips, Trips and Falls by Connecticut DOL
Slips, Trips and Falls by Connecticut DOLSlips, Trips and Falls by Connecticut DOL
Slips, Trips and Falls by Connecticut DOL
 
Hazard Communication Training by Maine Department of Labor
Hazard Communication Training by Maine Department of LaborHazard Communication Training by Maine Department of Labor
Hazard Communication Training by Maine Department of Labor
 
Slips, Trips, and Falls by Signalmutual
Slips, Trips, and Falls by SignalmutualSlips, Trips, and Falls by Signalmutual
Slips, Trips, and Falls by Signalmutual
 
Preventing Slips, Trips and Falls in the Health Care Industry by GTRI
Preventing Slips, Trips and Falls in the Health Care Industry by GTRIPreventing Slips, Trips and Falls in the Health Care Industry by GTRI
Preventing Slips, Trips and Falls in the Health Care Industry by GTRI
 
Energy Control Program by MCIEAST
Energy Control Program by MCIEASTEnergy Control Program by MCIEAST
Energy Control Program by MCIEAST
 
Hazardous Energy Control by MSHA
Hazardous Energy Control by MSHAHazardous Energy Control by MSHA
Hazardous Energy Control by MSHA
 
Hazard Communication Training by Oklahoma State University
Hazard Communication Training by Oklahoma State UniversityHazard Communication Training by Oklahoma State University
Hazard Communication Training by Oklahoma State University
 
Lock Out-Tag Out Training by Ryko
Lock Out-Tag Out Training by RykoLock Out-Tag Out Training by Ryko
Lock Out-Tag Out Training by Ryko
 
Lockout Tagout by Snohomish County
Lockout Tagout by Snohomish CountyLockout Tagout by Snohomish County
Lockout Tagout by Snohomish County
 
The Control of Hazardous Energy by SAPPI
The Control of Hazardous Energy by SAPPIThe Control of Hazardous Energy by SAPPI
The Control of Hazardous Energy by SAPPI
 
Lockout Tagout by FirstSource
Lockout Tagout by FirstSourceLockout Tagout by FirstSource
Lockout Tagout by FirstSource
 
Hazard Communication Training Program by MIOSHA
 Hazard Communication Training Program by MIOSHA Hazard Communication Training Program by MIOSHA
Hazard Communication Training Program by MIOSHA
 
Slips, Trips and Falls Training by WITC
Slips, Trips and Falls Training by WITCSlips, Trips and Falls Training by WITC
Slips, Trips and Falls Training by WITC
 
Personal Protective Equipment Training by San Diego State University
Personal Protective Equipment Training by San Diego State UniversityPersonal Protective Equipment Training by San Diego State University
Personal Protective Equipment Training by San Diego State University
 

Ähnlich wie HIPAA 101 Privacy and Security Training by University of Californa San Francisco

Healthcare Compliance and Privacy/Security Training by UCONN
Healthcare Compliance and Privacy/Security Training by UCONNHealthcare Compliance and Privacy/Security Training by UCONN
Healthcare Compliance and Privacy/Security Training by UCONNAtlantic Training, LLC.
 
Health care confidentiality and privacy
Health care confidentiality and privacyHealth care confidentiality and privacy
Health care confidentiality and privacysawanda
 
health insurance portability and accountability act.pptx
health insurance portability and accountability act.pptxhealth insurance portability and accountability act.pptx
health insurance portability and accountability act.pptxamartya2087
 
Your role in confidentiality
Your role in confidentialityYour role in confidentiality
Your role in confidentialityTrisha Ballard
 
Lesson_2 of 3_Telepractice_Telehealth_Law__Ethics_Implementation_Workshop.pptx
Lesson_2 of 3_Telepractice_Telehealth_Law__Ethics_Implementation_Workshop.pptxLesson_2 of 3_Telepractice_Telehealth_Law__Ethics_Implementation_Workshop.pptx
Lesson_2 of 3_Telepractice_Telehealth_Law__Ethics_Implementation_Workshop.pptxMarlene Maheu
 
Health Insurance and Portability and Accountability Act
Health Insurance and Portability and Accountability ActHealth Insurance and Portability and Accountability Act
Health Insurance and Portability and Accountability Actসারন দাস
 
Data Security and Privacy Practices
Data Security and Privacy PracticesData Security and Privacy Practices
Data Security and Privacy PracticesSpringfield Clinic
 
Training presentation week 1 kristin williford
Training presentation week 1 kristin willifordTraining presentation week 1 kristin williford
Training presentation week 1 kristin willifordkewrnrdh
 
Ruggiero.hipaa training
Ruggiero.hipaa trainingRuggiero.hipaa training
Ruggiero.hipaa trainingGina Ruggiero
 
Confidentiality and privacy
Confidentiality and privacyConfidentiality and privacy
Confidentiality and privacyWIBYTH4977
 
HIPAA and FDCPA Compliance for Process Servers
HIPAA and FDCPA Compliance for Process ServersHIPAA and FDCPA Compliance for Process Servers
HIPAA and FDCPA Compliance for Process ServersLawgical
 
This training program is designed to introduce staff
This training program is designed to introduce staffThis training program is designed to introduce staff
This training program is designed to introduce staffsawanda
 
Are You HIPAA Safe?
Are You HIPAA Safe?Are You HIPAA Safe?
Are You HIPAA Safe?TriageLogic
 

Ähnlich wie HIPAA 101 Privacy and Security Training by University of Californa San Francisco (20)

Healthcare Compliance and Privacy/Security Training by UCONN
Healthcare Compliance and Privacy/Security Training by UCONNHealthcare Compliance and Privacy/Security Training by UCONN
Healthcare Compliance and Privacy/Security Training by UCONN
 
Health care confidentiality and privacy
Health care confidentiality and privacyHealth care confidentiality and privacy
Health care confidentiality and privacy
 
health insurance portability and accountability act.pptx
health insurance portability and accountability act.pptxhealth insurance portability and accountability act.pptx
health insurance portability and accountability act.pptx
 
Your role in confidentiality
Your role in confidentialityYour role in confidentiality
Your role in confidentiality
 
Hipaa for business associates simple
Hipaa for business associates   simpleHipaa for business associates   simple
Hipaa for business associates simple
 
Lesson_2 of 3_Telepractice_Telehealth_Law__Ethics_Implementation_Workshop.pptx
Lesson_2 of 3_Telepractice_Telehealth_Law__Ethics_Implementation_Workshop.pptxLesson_2 of 3_Telepractice_Telehealth_Law__Ethics_Implementation_Workshop.pptx
Lesson_2 of 3_Telepractice_Telehealth_Law__Ethics_Implementation_Workshop.pptx
 
HIPAA Complaince
HIPAA ComplainceHIPAA Complaince
HIPAA Complaince
 
HIPAA
HIPAAHIPAA
HIPAA
 
Health Insurance and Portability and Accountability Act
Health Insurance and Portability and Accountability ActHealth Insurance and Portability and Accountability Act
Health Insurance and Portability and Accountability Act
 
HIPAA
HIPAAHIPAA
HIPAA
 
Data Security and Privacy Practices
Data Security and Privacy PracticesData Security and Privacy Practices
Data Security and Privacy Practices
 
Training presentation week 1 kristin williford
Training presentation week 1 kristin willifordTraining presentation week 1 kristin williford
Training presentation week 1 kristin williford
 
HIPAA
HIPAAHIPAA
HIPAA
 
Ruggiero.hipaa training
Ruggiero.hipaa trainingRuggiero.hipaa training
Ruggiero.hipaa training
 
Hippa training v2
Hippa training v2Hippa training v2
Hippa training v2
 
Confidentiality and privacy
Confidentiality and privacyConfidentiality and privacy
Confidentiality and privacy
 
HIPAA and FDCPA Compliance for Process Servers
HIPAA and FDCPA Compliance for Process ServersHIPAA and FDCPA Compliance for Process Servers
HIPAA and FDCPA Compliance for Process Servers
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
This training program is designed to introduce staff
This training program is designed to introduce staffThis training program is designed to introduce staff
This training program is designed to introduce staff
 
Are You HIPAA Safe?
Are You HIPAA Safe?Are You HIPAA Safe?
Are You HIPAA Safe?
 

Mehr von Atlantic Training, LLC.

Stress and Worker Safety by Pennsylvania L&I
Stress and Worker Safety by Pennsylvania L&IStress and Worker Safety by Pennsylvania L&I
Stress and Worker Safety by Pennsylvania L&IAtlantic Training, LLC.
 
Workplace Harassment Prevention by UT EAP
Workplace Harassment Prevention by  UT EAPWorkplace Harassment Prevention by  UT EAP
Workplace Harassment Prevention by UT EAPAtlantic Training, LLC.
 
Preventing Falls, Slips and Trips by MGSU
Preventing Falls, Slips and Trips by MGSUPreventing Falls, Slips and Trips by MGSU
Preventing Falls, Slips and Trips by MGSUAtlantic Training, LLC.
 
Preventing Workplace Harassment by Pennsylvania L&I
Preventing Workplace Harassment by Pennsylvania L&IPreventing Workplace Harassment by Pennsylvania L&I
Preventing Workplace Harassment by Pennsylvania L&IAtlantic Training, LLC.
 
Warehouses In Emergencies by WFP Logistics
Warehouses In Emergencies by WFP LogisticsWarehouses In Emergencies by WFP Logistics
Warehouses In Emergencies by WFP LogisticsAtlantic Training, LLC.
 
Sexual Harassment in the Workplace Training by Shumaker
Sexual Harassment in the Workplace Training by ShumakerSexual Harassment in the Workplace Training by Shumaker
Sexual Harassment in the Workplace Training by ShumakerAtlantic Training, LLC.
 
New Employee Safety Orientation by Oregon State University
New Employee Safety Orientation by Oregon State UniversityNew Employee Safety Orientation by Oregon State University
New Employee Safety Orientation by Oregon State UniversityAtlantic Training, LLC.
 

Mehr von Atlantic Training, LLC. (20)

Wellness for Supervisors by SWOSU
Wellness for Supervisors by SWOSUWellness for Supervisors by SWOSU
Wellness for Supervisors by SWOSU
 
Workplace Wellness by PHA
Workplace Wellness by PHAWorkplace Wellness by PHA
Workplace Wellness by PHA
 
Stress Management Training by SG
Stress Management Training by  SGStress Management Training by  SG
Stress Management Training by SG
 
Stress Management Training by SW
Stress Management Training by SWStress Management Training by SW
Stress Management Training by SW
 
Stress and Worker Safety by Pennsylvania L&I
Stress and Worker Safety by Pennsylvania L&IStress and Worker Safety by Pennsylvania L&I
Stress and Worker Safety by Pennsylvania L&I
 
Respectful Workplace by RDTC
Respectful Workplace by RDTCRespectful Workplace by RDTC
Respectful Workplace by RDTC
 
Workplace Harassment by CLGW
Workplace Harassment by CLGWWorkplace Harassment by CLGW
Workplace Harassment by CLGW
 
Workplace Harassment Prevention by UT EAP
Workplace Harassment Prevention by  UT EAPWorkplace Harassment Prevention by  UT EAP
Workplace Harassment Prevention by UT EAP
 
Welding Safety by Pennsylvania L&I
Welding Safety by Pennsylvania L&IWelding Safety by Pennsylvania L&I
Welding Safety by Pennsylvania L&I
 
Slips Trips & Falls Training by Signal
Slips Trips & Falls Training by SignalSlips Trips & Falls Training by Signal
Slips Trips & Falls Training by Signal
 
Preventing Falls, Slips and Trips by MGSU
Preventing Falls, Slips and Trips by MGSUPreventing Falls, Slips and Trips by MGSU
Preventing Falls, Slips and Trips by MGSU
 
Preventing Workplace Harassment by Pennsylvania L&I
Preventing Workplace Harassment by Pennsylvania L&IPreventing Workplace Harassment by Pennsylvania L&I
Preventing Workplace Harassment by Pennsylvania L&I
 
Warehouses In Emergencies by WFP Logistics
Warehouses In Emergencies by WFP LogisticsWarehouses In Emergencies by WFP Logistics
Warehouses In Emergencies by WFP Logistics
 
Prevention of Sexual Harassment by USMC
Prevention of Sexual Harassment by USMCPrevention of Sexual Harassment by USMC
Prevention of Sexual Harassment by USMC
 
Sexual Harassment by DEOMI
Sexual Harassment by DEOMISexual Harassment by DEOMI
Sexual Harassment by DEOMI
 
Sexual Harassment in the Workplace Training by Shumaker
Sexual Harassment in the Workplace Training by ShumakerSexual Harassment in the Workplace Training by Shumaker
Sexual Harassment in the Workplace Training by Shumaker
 
Sexual Harassment Training by NAP
Sexual Harassment Training by NAPSexual Harassment Training by NAP
Sexual Harassment Training by NAP
 
Scaffolds Training by Pennsylvania L&I
Scaffolds Training by Pennsylvania L&IScaffolds Training by Pennsylvania L&I
Scaffolds Training by Pennsylvania L&I
 
Supervision
SupervisionSupervision
Supervision
 
New Employee Safety Orientation by Oregon State University
New Employee Safety Orientation by Oregon State UniversityNew Employee Safety Orientation by Oregon State University
New Employee Safety Orientation by Oregon State University
 

Kürzlich hochgeladen

AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 

Kürzlich hochgeladen (20)

AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 

HIPAA 101 Privacy and Security Training by University of Californa San Francisco

  • 1. HIPAA 101 Privacy and Security Training Copyright 2011 The Regents of University of California All Rights Reserved The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
  • 2. Privacy and Security Training Privacy and Security for New UCSF Workforce • • • • • • • • Faculty Post Docs Residents / Fellows Staff Students Trainees Volunteers Contractors / Vendors Copyright 2011 The Regents of University of California All Rights Reserved The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
  • 3. Course Objectives Privacy and Security Training explains: • The requirements of the federal HIPAA/HITECH regulations, state privacy laws, and University policies and procedures that protect the privacy and security of confidential data • How these affect you and your job • What information must be protected • How you can protect confidential and sensitive information • Your responsibilities for good computer practices • How to report privacy breaches and security incidents Copyright 2011 The Regents of University of California All Rights Reserved The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
  • 4. Privacy and Security Laws and University Policies This section explains the following laws and policies: Federal HIPAA Federal HITECH Act California State Medical Information Laws UC & UCSF policies and procedures Fines and penalties Copyright 2011 The Regents of University of California All Rights Reserved The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
  • 5. What is HIPAA? The Health Insurance Portability and Accountability Act (HIPAA) is a federal law that specifies administrative simplification provisions that: • Protect the privacy of patient information • Provide for electronic and physical security of patient health information • Require “minimum necessary” use and disclosure • Specify patient rights to approve the access and use of their medical information Copyright 2011 The Regents of University of California All Rights Reserved The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
  • 6. HITECH Act Updated HIPAA in 2009 As part of the American Recovery and Reinvestment Act of 2009, the Health Information Technology for Economic and Clinical Health (HITECH) Act updated federal HIPAA privacy and security standards. The updates include: • Breach notification requirements • Fine and penalty increases for privacy violations • Right to request copies of the electronic health care record in electronic format • Mandates that Business Associates are civilly and criminally liable for privacy and security violations Copyright 2011 The Regents of University of California All Rights Reserved The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
  • 7. California Medical Information Privacy Laws • Apply to individuals as well as institutions • Unauthorized access includes the inappropriate review or viewing of patient medical information without a direct need for diagnosis, treatment or other lawful use • Licensed facilities, like UCSF Medical Center, are required to report incidents of unauthorized access, use, or disclosure of PHI to the California Department of Public Health, and to the affected patient within 5 business days after breach detection • When you suspect or know of a breach you must report it to the Privacy Office immediately  Medical Center employees must also submit an Incident Report Copyright 2011 The Regents of University of California All Rights Reserved The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
  • 8. Privacy is bigger than HIPAA Other Federal Laws In addition to HIPAA, there are other federal laws which govern the release of information, mandate that information be protected, and in some cases require that individuals be granted certain rights relative to control of and access of their information. •The Medicare Conditions of Participation require that hospitals promote each patient’s rights, including privacy (42 CFR Section 482.13). •The Federal Trade Commission (FTC) charged with protecting consumers requires banking and other industries to implement “red flag” standards (12 CFR Part 681) to detect and prevent identity theft related to customer and service accounts. These red flag rules extend to Health Care Institutions. •The Family Education Rights and Privacy Act (FERPA) governs the protection of education records which include student health records (20 USC 1232g). HIPAA specifically exempts individually identifiable health information in education records. As FERPA records are exempt from HIPAA, all releases from education records must be in accordance with FERPA regulations. •Federal Department of Health and Human Services (HHS) as well as multiple federal agencies require the protection of the privacy and confidentiality of participants in research clinical trails. Copyright 2011 The Regents of University of California All Rights Reserved The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
  • 9. Privacy is bigger than HIPAA California State Laws Confidentiality of Medical Information Act (CMIA) (Civil Code Section 56 et seq.) requires that: • • • Confidentiality of Medical Information be protected and establishes protections against disclosures of Individually Identifiable Medical Information Institutions notify California residents of breaches of electronic social security number, access codes to financial accounts, medical, and insurance information Healthcare institutions implement safeguards to protect the privacy and confidentiality of Medical Information Civil Code Sections 1785.11.2, 1798.29, 1798.82 and Health & Safety Code Section 130200 Health & Safety Code Section 1280.15 mandates that licensed clinics and health facilities report to both the Department of Public Health and the affected patient(s) any unlawful or unauthorized access to, or use or disclosure of, a patient’s Medical Information no later than 5 calendar days after the breach is detected. Cont’d… Copyright 2011 The Regents of University of California All Rights Reserved The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
  • 10. Privacy is bigger than HIPAA California State Laws Lanterman-Petris-Short (LPS) (Welfare and Institutions Code Section 5328 et seq.) provides special confidentiality protections for medical records containing mental health or development disabilities information. Title 22, California Code of Regulations, Section 70707(b)(8), requires acute care hospitals to protect patient rights to the confidential treatment of all information related to their care and stay at the hospital. Copyright 2011 The Regents of University of California All Rights Reserved The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
  • 11. University of California and UCSF • UC and UCSF have policies and procedures to protect the privacy and security of information • As a UCSF workforce member, you are responsible to follow these policies and procedures to protect the privacy and security of information • Ask your Supervisor or Manager for guidance • Remember that privacy applies to ALL verbal, written, and electronic information Copyright 2011 The Regents of University of California All Rights Reserved The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
  • 12. Fines and Penalties Privacy violations may carry penalties under federal HIPAA/HITECH, state privacy laws, and UC policies: • HIPAA Criminal Penalties  $50,000 - $1,500,000 fines  Imprisonment up to 10 years • HIPAA Civil Penalties  $100 - $25,000 / year fines  More fines if multiple year violations • State Laws  Fines and penalties apply to individuals as well as health care providers, up to a maximum of $250,000; may impact your professional license  Imprisonment up to 10 years • UCSF corrective and disciplinary actions  Up to and including loss of privileges and termination of employment Copyright 2011 The Regents of University of California All Rights Reserved The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
  • 13. How the Laws Affect You and Your Job This section explains: • How the privacy laws apply to you • Who uses PHI at UCSF Copyright 2011 The Regents of University of California All Rights Reserved The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
  • 14. How the HIPAA Laws Apply to You HIPAA requires that UCSF train all workforce members about the University’s HIPAA policies and specific procedures which may affect the work you do. These rules apply to you when you look at, use, or share Protected Health Information (PHI). Copyright 2011 The Regents of University of California All Rights Reserved The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
  • 15. Who Uses PHI at UCSF? • Anyone who works with or may view health, financial, or confidential information with HIPAA protected health identifiers • Everyone who uses a computer or electronic device which stores and/or transmits information • The following workforce members: o All Medical Center staff o Faculty Group Practice staff o Schools of Medicine, Nursing, Dentistry: staff and faculty o Campus staff who work in clinical areas o Administrative staff with access to PHI o Volunteers o Students who work with patients o Researchers and staff investigators o Accounting and payroll staff o Almost EVERYONE, at one time or another Copyright 2011 The Regents of University of California All Rights Reserved The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
  • 16. Protected Health Information (PHI) This section explains: • • • • • What information must be protected PHI identifiers UCSF’s usage or disclosure of PHI The Notice of Privacy Practices (NOPP) for PHI Purposes other than Treatment, Payment, or Operations (TPO) • Examples of TPO • Exceptions to the “Minimum Necessary” standard • When you should view, use, or share PHI Copyright 2011 The Regents of University of California All Rights Reserved The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
  • 17. What Information Must Be Protected? You must protect an individual’s PHI which is collected or created as a consequence of a health care provision. • PHI:  Is information related to a patient’s past, present or future physical and/or mental health or condition  Can be in any form: written, spoken, or electronic (including video, photographs, and x-rays)  Includes at least one of the 18 personal identifiers in association with health information • These rules apply to you when you view, use, and share PHI • Any health information with identifiers (on the following page) is Protected Health Information (PHI) Copyright 2011 The Regents of University of California All Rights Reserved The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
  • 18. Protected Health Information (PHI) Identifiers The 18 Identifiers defined by HIPAA are:            Name Postal address All elements of dates except year Telephone number Fax number Email address URL address IP address Social security number Account numbers License numbers  Medical record number  Health plan beneficiary #  Device identifiers and their     serial numbers Vehicle identifiers and serial number Biometric identifiers (finger and voice prints) Full face photos and other comparable images Any other unique identifying number, code, or characteristic Copyright 2011 The Regents of University of California All Rights Reserved The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
  • 19. UCSF’s Use or Disclosure of PHI In order for UCSF to use or disclose PHI: •UCSF must give each patient a Notice of Privacy Practices that:  Describes how UCSF may use and disclose the patient’s PHI  Advises the patient of his/her privacy rights •The University must attempt to obtain the patient’s signature acknowledging receipt of the Notice, except in emergency situations. If a signature is not obtained, the University must document the reason why it was not. Copyright 2011 The Regents of University of California All Rights Reserved The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
  • 20. Notice of Privacy Practices for PHI The Notice of Privacy Practices (NOPP) allows PHI to be used and disclosed for purposes of TPO • Treatment (T), Payment (P), Operations (O)  TPO includes teaching, medical staff/peer review, legal, auditing, customer service, business management, and releases mandated by law  UCSF must have a Business Associate Agreement (BAA) with vendors who will use PHI when providing a service to UCSF Copyright 2011 The Regents of University of California All Rights Reserved The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
  • 21. For Purposes Other Than TPO Unless required or permitted by law, UCSF must obtain written authorization from the patient to use, disclose, or access patient information. • Patient Authorization allows UCSF to disclose information for purposes not related to treatment, payment, or operations •For human subjects research, additional rules and training apply (see Committee for Human Research website for guidance at http://www.research.ucsf.edu/chr/HIPAA/chrHIPAA.asp) • PHI may not be accessed for human subjects research unless • • The Committee for Human Research (CHR) has approved the research and BOTH Informed Consent and HIPAA Authorization have been obtained from the subject, OR CHR has approved a Waiver of Informed Consent and HIPAA Authorization NOTE: if you obtain or use PHI for research purposes with only an Informed Consent but without a HIPAA Authorization, it is considered an unauthorized disclosure under HIPAA. Copyright 2011 The Regents of University of California All Rights Reserved The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
  • 22. For Purposes Other Than TPO If you are involved in fundraising, additional rules apply: • UCSF Privacy and Confidentiality Handbook for guidance at http://hipaa.ucsf.edu/Privacy%20Handbook.pdf • Policy 450-10 Authority to Solicit Funds through Gifts, Private Grants and Events at http://policies.ucsf.edu  PHI may not be accessed for fundraising without prior written authorization from the patient  For use or disclosure of PHI, an Authorization for Fundraising is required. Only a patient’s healthcare provider may request that the patient sign the Authorization. Authorizations for fundraising must be forwarded to UCSF’s Development and Alumni Relations (UDAR) office.  UCSF policy requires providers, departments, divisions and all other UCSF entities to coordinate with UDAR for all fundraising efforts that target patients Copyright 2011 The Regents of University of California All Rights Reserved The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
  • 23. Examples of TPO • The patient’s referring physician calls and asks for a copy of the patient’s recent exam at UCSF (Treatment) • A patient’s insurance company calls and requests a copy of the patient’s medical record for a specific service date (Payment) • The Quality Improvement office calls and asks for a copy of an operative report (Health Care Operations) For these TPO purposes, patient information may be provided Copyright 2011 The Regents of University of California All Rights Reserved The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
  • 24. Except for Treatment, the Minimum Necessary Standard Applies • For patient care and treatment, HIPAA does not impose restrictions on use and disclosure of PHI by health care providers  Exceptions: psychotherapy information, HIV test results, and substance abuse information • For anything else, HIPAA requires users to access the minimum amount of information necessary to perform their duties.  Example: a billing clerk may need to know what laboratory test was done, but not the result Copyright 2011 The Regents of University of California All Rights Reserved The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
  • 25. When Should You? • View PHI • Use PHI • Share PHI Copyright 2011 The Regents of University of California All Rights Reserved The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
  • 26. Remember • Use information only when necessary to perform your job duties • Use only the minimum necessary to perform your job duties • Follow UCSF Medical Center or UCSF campus policies and procedures for information confidentiality and security • Ask your supervisor for your department’s privacy and security procedures Copyright 2011 The Regents of University of California All Rights Reserved The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
  • 27. Scenario 1 I do not work with patients or have access to medical records, however I see patients pass by my desk in the clinic. Can I talk about the patients with my coworkers, family and friends even if it has nothing to do with my job? A. You may not discuss any patient information with anyone unless required for your job B. You may only talk about the patient with our coworkers C. You may only talk about the patient with your family and friends Copyright 2011 The Regents of University of California All Rights Reserved The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
  • 28. Scenario 1 - Answer The correct answer is A. Information can only be used as needed for your job. A. You may not discuss any patient information with anyone unless required for your job B. You may only talk about the patient with our coworkers C. You may only talk about the patient with your family and friends Copyright 2011 The Regents of University of California All Rights Reserved The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
  • 29. Scenario 2 I work in Admitting and my friend, who works in the Emergency Department, told me that she just saw a famous movie star get on the elevator. My friend read in the paper that the movie star has cancer and asked me to find out what floor that star is on. Can I give my friend the information? A. It is okay as I am only looking up her location, not her medical condition B. I already have approval to access patient clinical systems, so no one will know that I accessed it C. It is not necessary for my job, so I would be violating the patient’s privacy by checking on her location and by sharing this information with my friend Copyright 2011 The Regents of University of California All Rights Reserved The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
  • 30. Scenario 2 - Answer The correct answer is C. It is not part of your or your friend’s job, even if you are a system user. Your access to the record will automatically be recorded and can be tracked. Both you and your friend are not protecting the privacy of this patient. There could be serious consequences to your employment. A. It is okay as I am only looking her location, not her medical condition B. I already have approval to access patient clinical systems, so no one will know that I access it C. It is not necessary for my job, so I would be violating the patient’s privacy by checking on her location and by sharing this information with my friend Copyright 2011 The Regents of University of California All Rights Reserved The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
  • 31. Scenario 3 As a file clerk, it is my job to see PHI, but while opening lab reports, I saw my manager’s pregnancy test results. Her pregnancy test was positive! I congratulated her, but found out that I was the first person to tell her. Did I do the right thing? A. It is okay as it was part of my job to see PHI B. She is an employee at UCSF, so it is okay to look at other UCSF employee records C. I should not have used the information as it was not my job to discuss lab results, to provide a diagnosis, or to use her information outside of my job duties Copyright 2011 The Regents of University of California All Rights Reserved The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
  • 32. Scenario 3 - Answer The correct answer is C. There was impermissible disclosure of her information. UCSF employees can also be patients. As such, they have all the same rights to privacy of their information as does any other patient. This was also a violation of UCSF policy, which could impact your employment. A. It is okay as it was part of my job to see PHI B. She is an employee at UCSF, so it is okay to look at other UCSF employee records C. I should not have used the information as it was not my job to discuss lab results, to provide a diagnosis, or to use her information outside of my job duties Copyright 2011 The Regents of University of California All Rights Reserved The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
  • 33. Scenario 4 Because I have access to confidential patient information as part of my job, I can look up anybody’s record, even if they are not my patient, as long as I keep the information to myself. A. True, as long as I do not share this information B. I can only look at records when it is required by my job C. I can access hard copy medical charts, but not electronic records, anytime I want Copyright 2011 The Regents of University of California All Rights Reserved The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
  • 34. Scenario 4 - Answer The correct Answer is B. It is acceptable only when it is necessary for your job and only the minimum information necessary to do your job. Idle curiosity can jeopardize the patient’s privacy and your employment. A. True, as long as I do not share this information B. I can only look at records when it is required by my job C. I can access hard copy medical charts, but not electronic records anytime I want Copyright 2011 The Regents of University of California All Rights Reserved The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
  • 35. Protecting Privacy This Section Explains: • • • • • Verbal exchanges Knowing where you left your paperwork Disposal of paper documents Security of Electronic Patient Information (ePHI) Privacy breach from lost, stolen, or misdirected information • Incidents from any format of information Copyright 2011 The Regents of University of California All Rights Reserved The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
  • 36. Verbal Exchanges • Patients may see normal clinical operations as violating their privacy • Be aware of your surroundings when talking • Do not leave PHI on answering machines • Ask yourself, “What if it was my information being discussed like this?” Copyright 2011 The Regents of University of California All Rights Reserved The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
  • 37. Know Where You Left Your Paperwork • Check printers, faxes, copier machines when you are done using them • Ensure paper charts are returned to applicable areas in nursing stations, medical records, or designated file rooms • Do not leave hard copies of PHI laying on your desk; lock it up in your desk at the end of the day • Seal envelopes well when mailing Copyright 2011 The Regents of University of California All Rights Reserved The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
  • 38. Disposal of Paper Documents • Shred or destroy PHI before throwing it away • Dispose of paper and other records with PHI in secured shredding bins. Recycling and Trash bins are NOT secure. • Shredding bins work best when papers are put inside the bins. When papers are left outside the bin, they are not secured from:  Daily gossip  Daily trash  The public Copyright 2011 The Regents of University of California All Rights Reserved The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
  • 39. Security of Electronic Patient Information (ePHI) Good security standards follow the “90/10” Rule: • 10% of security safeguards are technical • 90% of security safeguards rely on the computer user (YOU) to adhere to good computer practices Copyright 2011 The Regents of University of California All Rights Reserved The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
  • 40. Privacy Breach from Lost, Stolen, or Misdirected Information A privacy breach can occur when information is: • Physically lost or stolen  Paper copies, films, tapes, electronic devices  Anytime, anywhere - even while on public transportation, crossing the street, in the building, in your office • Misdirected to others outside of UCSF  Verbal messages sent to or left on the wrong voicemail or sent to or left for the wrong person  Mislabeled mail, misdirected email  Wrong fax number, wrong phone number  Placed on UCSF intranet, internet, websites, Facebook, Twitter  Not using UCSF’s secured email tool Copyright 2011 The Regents of University of California All Rights Reserved The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
  • 41. Examples of Privacy Breaches • Talking in public areas, talking too loudly, talking to the wrong person • Lost/stolen or improperly disposed of paper, mail, films, notebooks • Lost/stolen laptops, PDAs, cell phones, media devices (video and audio recordings) • Lost/stolen zip disks, CDs, flash drives, memory drives • Hacking of unprotected computer systems • Email or faxes sent to the wrong address, wrong person, or wrong number • User not logging off of computer systems, allowing others to access their computer or system Copyright 2011 The Regents of University of California All Rights Reserved The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
  • 42. Scenario 5 I called a patient’s phone number and left a voice mail for Mr. John Smith to contact UCSF regarding his scheduled thyroid surgery. Was this a privacy breach? A. No, the patient provided this phone number B. Yes, I stated his name and medical procedure C. No, I did not state the medical reason for the surgery Copyright 2011 The Regents of University of California All Rights Reserved The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
  • 43. Scenario 5 - Answer The correct answer is B. Patient name in conjunction with any medical information constitutes PHI. You do not know who will hear the message; the patient may not have told his family, friend or roommate. It is best practice to leave the minimum amount of information needed: your name, phone number, and that you are from UCSF. Never leave PHI on an answering machine. Ask your supervisor for the voice mail procedure in your area. A. No, the patient provided this phone number B. Yes, I stated his name and medical procedure C. No, I did not state the medical reason for the surgery Copyright 2011 The Regents of University of California All Rights Reserved The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
  • 44. Your Responsibilities for Good Computing Practice This section explains: • Computer security • Protecting portable devices • Safe emailing • Additional security precautions Copyright 2011 The Regents of University of California All Rights Reserved The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
  • 45. Computer Security • Ensure your computer and data are physically secured by using lockdown cables, locked drawers, placement in a secured area, etc. • Create a strong password and do not share your username or password with anyone • Log off your computer terminal when you are done, or even if you walk away for a few moments • Ensure information on computer screens is not visible to passersby  Use a privacy screen  Lock your PC by using the keyboard command Ctrl + Alt + Delete  Use a password to start up or wake-up your computer • Ensure your system has anti-virus and all necessary security patches and updates • UCSF IT website: http://it.ucsfmedicalcenter.org Copyright 2011 The Regents of University of California All Rights Reserved The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
  • 46. Portable Device Security Tips • Always encrypt portable devices and media with confidential information on them (laptops, flash drives, memory sticks, external drives, CDs, etc.) • Encryption must be an approved UCSF data encryption solution  Check with the IT department. A UCSF Medical Center or Campus owned device may have already been encrypted for you.  Purchase only electronic devices and media which can be encrypted. See UCSF OAAIS Best Practices staff website: http://its.ucsf.edu/ Best Practice: Do not keep confidential data on portable devices unless absolutely necessary. And if necessary, the information must be encrypted. Copyright 2011 The Regents of University of California All Rights Reserved The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
  • 47. How to Send UCSF Emails Securely • When using either the School of Medicine, Medical Center or Campus email, you can secure your message by using one of the following words in the subject line:  ePHI:  PHI:  Secure: • Detailed instructions are available at:  Medical Center Information Technology http://it.ucsfmedicalcenter.org/secure_email  School of Medicine Information Service Unit (ISU) http://secureemail.ucsfmedicalcenter.org  Campus IT Security http://security.ucsf.edu Copyright 2011 The Regents of University of California All Rights Reserved The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
  • 48. Additional Security Precautions • Make sure your computer has anti-virus and all necessary security patches. UCSF Medical Center IT automatically updates these weekly. Do not interrupt these updates! You can continue to work while they are being installed. • Do not install unknown or unsolicited programs • Practice Safe Emailing  Do not open, forward, or reply to suspicious emails  Do not open suspicious email attachments or click on unknown website addresses  NEVER provide your username and password to an email request  Delete spam and empty the “Deleted Items” folder  Use a secure email solution whenever sending email outside UCSF • It is your responsibility when communicating to send all PHI securely Copyright 2011 The Regents of University of California All Rights Reserved The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
  • 49. Scenario 6 A physician is very busy and asks you to log into the clinical information system using his user ID and password to retrieve some patient reports. What should you do? A. It is a physician, so it is okay to do this B. Ignore the request and hope he forgets C. Decline the request and refer him to the UCSF information Security Policies D. None of the above Copyright 2011 The Regents of University of California All Rights Reserved The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
  • 50. Scenario 6 - Answer The correct answer is C. Always login under your own user ID and password. If you do not have system owner permission to access the system, then do not access the system. This would have been a violation of privacy and security policies. A. It is a physician, so it is okay to do this B. Ignore the request and hope she/he forgets C. Decline the request and refer them to the UCSF information Security Policies D. None of the above Copyright 2011 The Regents of University of California All Rights Reserved The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
  • 51. Scenario 7 As part of your job, you need to use a laptop as you work at various UCSF sites. You have patient emails, addresses, and medical information files on the laptop. What is the best way to protect this device? A. The information on my portable device is encrypted, I use a complex password, and I physically secure the device when leaving it unattended B. I only need a complex password to secure the laptop C. It is secured as I use a complex password and when unattended, I always lock it up in the trunk of my car D. None of the above Copyright 2011 The Regents of University of California All Rights Reserved The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
  • 52. Scenario 7- Answer The correct answer is A. Your laptop must be encrypted if it contains UCSF patient information or other sensitive confidential information. Password protection by itself is not enough but you do need to use complex passwords for the device and physically secure it when unattended. Unencrypted devices are considered unsecured in the event of a loss or theft by federal and state privacy laws and therefore reportable to federal and state agencies! A. B. C. D. The information on my portable device is encrypted, I use a complex password, and I physically secure the device when leaving it unattended I only need a complex password to secure the laptop It is secured as I use a complex password and when unattended, I always lock it up in the trunk of my car None of the above Copyright 2011 The Regents of University of California All Rights Reserved The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
  • 53. Question 1 Which workstation security safeguards are you responsible for using and/or protecting? A. B. C. D. Your User ID Your Password Logging out of programs that access PHI when not in use All of the above Copyright 2011 The Regents of University of California All Rights Reserved The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
  • 54. Question 1 - Answer The correct answer is D. Always log off programs and always protect your user ID and password. Never share these with anyone. A. B. C. D. Your User ID Your Password Logging out of programs that access PHI when not in use All of the above Copyright 2011 The Regents of University of California All Rights Reserved The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
  • 55. Reporting Privacy Breaches and Security Incidents This section explains: • How to report privacy breaches • How to report security breaches • The importance of immediately alerting known or suspected incidents • Where resources for privacy and security can be found Copyright 2011 The Regents of University of California All Rights Reserved The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
  • 56. How to Report Privacy Breaches Immediately report any known or suspected privacy breaches (such as paper, conversations, suspected unauthorized or inappropriate access or use of PHI) to the Privacy Office at (415) 353-2750. Copyright 2011 The Regents of University of California All Rights Reserved The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
  • 57. How to Report Security Incidents • Report lost or stolen laptops, Blackberries, PDAs, cell phones, and flash drives immediately to the UCSF Police Department at (415) 476-1414  Immediately report any unusual or suspected information security incidents to your Supervisor and/or Computing Support Coordinator, including but not limited to the loss and/or theft of any form of PHI (paper, films, etc.) as well as unusual computer activity • If no one is available to receive your report, contact Customer Support at (415) 514-4100 • You can also go to the UCSF website  Web: http://security.ucsf.edu/ Copyright 2011 The Regents of University of California All Rights Reserved The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
  • 58. Importance of Immediately Alerting Known or Suspected Incidents State law requires that unauthorized access, use or disclosure of patient medical information be reported within 5 working days of detection of the breach to the CA Department of Public Health, and the affected patient(s) or their legal representative. Copyright 2011 The Regents of University of California All Rights Reserved The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
  • 59. Remember To the patient, ALL information is private. • This includes a patient’s:  Personal information  Financial information  Medical information  Protected Health Information  Information in any format: spoken, written, or electronic Copyright 2011 The Regents of University of California All Rights Reserved The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
  • 60. Resources for Privacy and Security • Your Supervisor/Manager • Your Department’s IT or CSC person • Privacy Office  Contact Number: (415) 353-2750  Chief Privacy Officer: Deborah Yano-Fong • UCSF Information Security Officer: David Rusting • UCSF Medical Center Information Security Officer: Jose Claudio • UCSF School of Medicine ISU Director: Opinder Bawa • Online Resources:     UCSF Privacy Website: http://hipaa.ucsf.edu UCOP HIPAA Website: http://www.universityofcalifornia.edu/hipaa HIPAA and Research Website: http://www.research.ucsf.edu/chr/index.asp SATE Website: http://security.ucsf.edu Copyright 2011 The Regents of University of California All Rights Reserved The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
  • 61. Question 2 You can protect patient information by: A. B. C. D. E. Protecting verbal, written, and electronic information Utilizing safe computing skills Reporting suspected privacy and security incidents Following University policies All of the above Copyright 2011 The Regents of University of California All Rights Reserved The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
  • 62. Question 2 - Answer The correct answer is E. All of these actions helps to protect the privacy and security of patient information. A. B. C. D. E. Protecting verbal, written, and electronic information Utilizing safe computing skills Reporting suspected privacy and security incidents Following University policies All of the above Copyright 2011 The Regents of University of California All Rights Reserved The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.
  • 63. Next Steps Before completing and receiving credit for the Privacy and Security Training for New UCSF Employees, you MUST: 1. Read the Statement of Privacy Laws and University Policy: http://hipaa.ucsf.edu/education/downloads/ConfidentialityStatement.pdf 2. Understand the Acknowledgement of Responsibility (Signature Required) The Statement of Privacy Laws and University Policy can also be obtained from your Supervisor. In order to record your completion of this training, please turn in the signed copy of the “Acknowledgment of Responsibility” form to your Supervisor. Copyright 2011 The Regents of University of California All Rights Reserved The Regents of the University of California accepts no liability of any use of this presentation or reliance placed on it, as it is making no representation or warranty, express, or implied, as to the accuracy, reliability, or completeness of the presentation.

Hinweis der Redaktion

  1. Objective: Highlight three key components of HIPAA in simple, 6th grade level language Emphasize that it is a federal requirement