SlideShare ist ein Scribd-Unternehmen logo
1 von 16
HIPAA & HITECH
HIPAA
• Has been a federal privacy regulation since
  2003. Covers privacy and security of health
  information.
• Reviewed in annual education
• Taught in new employee orientation
• The facility Security Officer is Christie
  Messinger
• The facility Privacy Officer is Alane Bryan
HITECH
•   Does not replace HIPAA—it gives it TEETH!
•   Requires a breach notification policy
•   Encourages EHR adoption
•   Provides strict data protection regulations for
    more secure patient privacy
New Fines as of March 26, 2013
Violation Type                    Each Violation      Repeat Violations/Yr.
Did not know                      $100 - $50,000      $1.5 million
Reasonable Cause                  $1,000 - $50,000    $1.5 million
Willful Neglect – Corrected       $10,000 - $50,000   $1.5 million
Willful Neglect – Not Corrected   $50,000             $1.5 million


 •Healthcare organizations or providers may be held liable for
 violations.
 •Individual employees may be prosecuted or may be sued for
 civil penalties.
Breach Notifications
 Must notify individuals and HHS and, in some
  cases the media, of any substantiated
  breaches within 60 days.
 Breaches affecting 500 or more patients will
  be posted to the HHS.gov website.
Documented Breaches
•   Mass General
•   California Breaches
•   BCBS of TN Breach
•   Individual Prosecution
•   Personal Gain
Top Privacy Violations
•   Stolen laptops/computers
•   Lost CDs
•   ID theft/Social Security Numbers
•   Medicare Fraud
•   Access to EMR with no job-related need
Privacy Breach Examples
• Using Social Networking to talk about patients
• Discussing PHI with employees or family who
  do not have a job-related need
• Looking at EMR out of concern or curiosity
• Telling others that a patient was “in” for
  treatment
• Discussing progress or prognosis in front of
  family without permission
More Privacy Breach Examples
• Using chart to get information to use against
    patient in lawsuit or divorce
•   Looking in minor child’s EMR
•   Taking a peek for “educational purposes”
•   Starting conversations with “Don’t tell anyone
    I told you this, but…”
•   Sharing computer access/passwords
Permitted HIPAA Exceptions
•   Treatment, Payment, Operations
•   Some law enforcement exceptions
•   Public health reporting
•   When in doubt, get a Signed Release
•   Disclose “minimal necessary” amount of PHI
HIPAA, HITECH, & YOU
• Patients/family members requesting patient
  information AFTER DISCHARGE should be
  referred to the HIM Department
• If a patient requests information during an
  admission, make sure the report is FINAL before
  giving the information to the patient or to their
  designee (document the designee). We do not
  release information unless it is in a FINAL status.
• Discuss patient information as quietly as possible
HIPAA, HITECH, & YOU
•   Try not to say the patient’s name repeatedly
•   Make sure paper containing PHI makes it to a shred bin
•   Shred bins should be dumped in large bins each day
•   Use fax cover sheets with the confidentiality clause
•   Do not leave messages with too much information
•   Wear your employee ID badge at all times
HIPAA, HITECH, & YOU
• Use workstations for intended purposes
  – No gaming, no unauthorized downloading of files,
    personal emails are subject to access by P & S
    Surgical Hospital
• Log-off or lock your computer when you are
  not using it
• Make sure others cannot view your computer
  screen
HIPAA, HITECH, & YOU
• Keep passwords secure
• Use your own individual password
• Avoid sharing passwords
• Trigger encryption for emails containing PHI
  being sent outside the organization
• If photos must be taken of a patient, use a
  P & S camera or device; NEVER use your
  personal camera or smart phone
HIPAA, HITECH, & YOU
• Never share proprietary or confidential
  information in blogs or on social media sites
• Report potential breaches, inappropriate
  disclosures, or otherwise suspect behavior to
  your direct supervisor, the Privacy Officer, the
  Security Officer, or the Corporate Compliance
  Officer
End of Presentation
• This is the end of presentation. Click on blue
  Quiz button next.

Weitere ähnliche Inhalte

Was ist angesagt? (17)

Hipaa 1
Hipaa 1Hipaa 1
Hipaa 1
 
Confidentiality slide
Confidentiality slideConfidentiality slide
Confidentiality slide
 
Mha690 w1 d2
Mha690 w1 d2Mha690 w1 d2
Mha690 w1 d2
 
Tiffany hall mha 690 week 1 discussion 2
Tiffany hall mha 690 week 1   discussion 2Tiffany hall mha 690 week 1   discussion 2
Tiffany hall mha 690 week 1 discussion 2
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Hippa presentation2
Hippa presentation2Hippa presentation2
Hippa presentation2
 
Ruggiero.hipaa training
Ruggiero.hipaa trainingRuggiero.hipaa training
Ruggiero.hipaa training
 
Hippa training 2017
Hippa training 2017Hippa training 2017
Hippa training 2017
 
Welcome to the hippa, privacy and security
Welcome to the hippa, privacy and securityWelcome to the hippa, privacy and security
Welcome to the hippa, privacy and security
 
HIPAA and Privacy Training
HIPAA and Privacy TrainingHIPAA and Privacy Training
HIPAA and Privacy Training
 
Hippa
HippaHippa
Hippa
 
Patient confidentiality.ppt
Patient confidentiality.pptPatient confidentiality.ppt
Patient confidentiality.ppt
 
Hippa 2021
Hippa 2021Hippa 2021
Hippa 2021
 
MHA690 confidentiality training
MHA690 confidentiality trainingMHA690 confidentiality training
MHA690 confidentiality training
 
Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentiality
 
Hippa
HippaHippa
Hippa
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 

Andere mochten auch (8)

Quality improvement 2015
Quality improvement 2015Quality improvement 2015
Quality improvement 2015
 
Quality Assurancev and improvement guide
Quality Assurancev and improvement guideQuality Assurancev and improvement guide
Quality Assurancev and improvement guide
 
MEDICAL ETHICS IN RESEARCH PROPOSALS ( Indian contest )
MEDICAL ETHICS INRESEARCH PROPOSALS  ( Indian contest )    MEDICAL ETHICS INRESEARCH PROPOSALS  ( Indian contest )
MEDICAL ETHICS IN RESEARCH PROPOSALS ( Indian contest )
 
Jci mentoring program
Jci mentoring programJci mentoring program
Jci mentoring program
 
Project Management Class ( based on PMBOK) - Day 4
Project Management Class ( based on PMBOK) - Day 4Project Management Class ( based on PMBOK) - Day 4
Project Management Class ( based on PMBOK) - Day 4
 
Lecture2 introduction-to-medical-ethics(29.09.16)
Lecture2 introduction-to-medical-ethics(29.09.16)Lecture2 introduction-to-medical-ethics(29.09.16)
Lecture2 introduction-to-medical-ethics(29.09.16)
 
JCIA PRESENTATION
JCIA PRESENTATIONJCIA PRESENTATION
JCIA PRESENTATION
 
Introduction to medical ethics
Introduction to medical ethics	Introduction to medical ethics
Introduction to medical ethics
 

Ähnlich wie Hipaa

Annual HIPAA Education
Annual HIPAA EducationAnnual HIPAA Education
Annual HIPAA Education
DirkRhodes
 
Patient privacy and confidentiality training
Patient privacy and confidentiality trainingPatient privacy and confidentiality training
Patient privacy and confidentiality training
tlprobinson
 
Patient confidentiality power point
Patient confidentiality power pointPatient confidentiality power point
Patient confidentiality power point
chwiso8418
 
Patient confidentiality power point
Patient confidentiality power pointPatient confidentiality power point
Patient confidentiality power point
chwiso8418
 
Hipaa Refresher Training
Hipaa Refresher TrainingHipaa Refresher Training
Hipaa Refresher Training
Brian
 
William schuch week 1 mha690 capstone ppp
William schuch week 1 mha690 capstone pppWilliam schuch week 1 mha690 capstone ppp
William schuch week 1 mha690 capstone ppp
William Schuch
 

Ähnlich wie Hipaa (20)

Are You HIPAA Safe?
Are You HIPAA Safe?Are You HIPAA Safe?
Are You HIPAA Safe?
 
5 hipaa training
5 hipaa training5 hipaa training
5 hipaa training
 
Annual HIPAA Education
Annual HIPAA EducationAnnual HIPAA Education
Annual HIPAA Education
 
Patient privacy and confidentiality training
Patient privacy and confidentiality trainingPatient privacy and confidentiality training
Patient privacy and confidentiality training
 
Hipaa 2012
Hipaa 2012Hipaa 2012
Hipaa 2012
 
Rems hipaa
Rems hipaaRems hipaa
Rems hipaa
 
Patient confidentiality power point
Patient confidentiality power pointPatient confidentiality power point
Patient confidentiality power point
 
Patient confidentiality power point
Patient confidentiality power pointPatient confidentiality power point
Patient confidentiality power point
 
Hipaa pesentation
Hipaa pesentationHipaa pesentation
Hipaa pesentation
 
Hipaa Refresher Training
Hipaa Refresher TrainingHipaa Refresher Training
Hipaa Refresher Training
 
Understanding hipaa
Understanding hipaaUnderstanding hipaa
Understanding hipaa
 
Data Security and Privacy Practices
Data Security and Privacy PracticesData Security and Privacy Practices
Data Security and Privacy Practices
 
Phi masella
Phi masellaPhi masella
Phi masella
 
PROTECTED HEALTH INFORMATION_PATIENT PRIVACY
PROTECTED HEALTH INFORMATION_PATIENT PRIVACYPROTECTED HEALTH INFORMATION_PATIENT PRIVACY
PROTECTED HEALTH INFORMATION_PATIENT PRIVACY
 
Hippa health admin week 1 question 2
Hippa health admin week 1 question 2Hippa health admin week 1 question 2
Hippa health admin week 1 question 2
 
William schuch week 1 mha690 capstone ppp
William schuch week 1 mha690 capstone pppWilliam schuch week 1 mha690 capstone ppp
William schuch week 1 mha690 capstone ppp
 
C. Gibbs MHA 690 week 1 discussion 2
C. Gibbs MHA 690 week 1 discussion 2C. Gibbs MHA 690 week 1 discussion 2
C. Gibbs MHA 690 week 1 discussion 2
 
Hipaa training
Hipaa trainingHipaa training
Hipaa training
 
Mha 690 week 1 discussion presentation
Mha 690 week 1 discussion presentationMha 690 week 1 discussion presentation
Mha 690 week 1 discussion presentation
 
Hipaa overview 073118
Hipaa overview 073118Hipaa overview 073118
Hipaa overview 073118
 

Mehr von pssurgery (11)

Customer Service 2015
Customer Service 2015Customer Service 2015
Customer Service 2015
 
Infection Control 2015
Infection Control 2015Infection Control 2015
Infection Control 2015
 
Safety-2015
Safety-2015Safety-2015
Safety-2015
 
Compliance2015
Compliance2015Compliance2015
Compliance2015
 
Blood
BloodBlood
Blood
 
Compliance
ComplianceCompliance
Compliance
 
Cultural sensitivity
Cultural sensitivityCultural sensitivity
Cultural sensitivity
 
Quality
QualityQuality
Quality
 
Infection
InfectionInfection
Infection
 
Abuse
AbuseAbuse
Abuse
 
Safety
SafetySafety
Safety
 

Kürzlich hochgeladen

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Kürzlich hochgeladen (20)

Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 

Hipaa

  • 2. HIPAA • Has been a federal privacy regulation since 2003. Covers privacy and security of health information. • Reviewed in annual education • Taught in new employee orientation • The facility Security Officer is Christie Messinger • The facility Privacy Officer is Alane Bryan
  • 3. HITECH • Does not replace HIPAA—it gives it TEETH! • Requires a breach notification policy • Encourages EHR adoption • Provides strict data protection regulations for more secure patient privacy
  • 4. New Fines as of March 26, 2013 Violation Type Each Violation Repeat Violations/Yr. Did not know $100 - $50,000 $1.5 million Reasonable Cause $1,000 - $50,000 $1.5 million Willful Neglect – Corrected $10,000 - $50,000 $1.5 million Willful Neglect – Not Corrected $50,000 $1.5 million •Healthcare organizations or providers may be held liable for violations. •Individual employees may be prosecuted or may be sued for civil penalties.
  • 5. Breach Notifications  Must notify individuals and HHS and, in some cases the media, of any substantiated breaches within 60 days.  Breaches affecting 500 or more patients will be posted to the HHS.gov website.
  • 6. Documented Breaches • Mass General • California Breaches • BCBS of TN Breach • Individual Prosecution • Personal Gain
  • 7. Top Privacy Violations • Stolen laptops/computers • Lost CDs • ID theft/Social Security Numbers • Medicare Fraud • Access to EMR with no job-related need
  • 8. Privacy Breach Examples • Using Social Networking to talk about patients • Discussing PHI with employees or family who do not have a job-related need • Looking at EMR out of concern or curiosity • Telling others that a patient was “in” for treatment • Discussing progress or prognosis in front of family without permission
  • 9. More Privacy Breach Examples • Using chart to get information to use against patient in lawsuit or divorce • Looking in minor child’s EMR • Taking a peek for “educational purposes” • Starting conversations with “Don’t tell anyone I told you this, but…” • Sharing computer access/passwords
  • 10. Permitted HIPAA Exceptions • Treatment, Payment, Operations • Some law enforcement exceptions • Public health reporting • When in doubt, get a Signed Release • Disclose “minimal necessary” amount of PHI
  • 11. HIPAA, HITECH, & YOU • Patients/family members requesting patient information AFTER DISCHARGE should be referred to the HIM Department • If a patient requests information during an admission, make sure the report is FINAL before giving the information to the patient or to their designee (document the designee). We do not release information unless it is in a FINAL status. • Discuss patient information as quietly as possible
  • 12. HIPAA, HITECH, & YOU • Try not to say the patient’s name repeatedly • Make sure paper containing PHI makes it to a shred bin • Shred bins should be dumped in large bins each day • Use fax cover sheets with the confidentiality clause • Do not leave messages with too much information • Wear your employee ID badge at all times
  • 13. HIPAA, HITECH, & YOU • Use workstations for intended purposes – No gaming, no unauthorized downloading of files, personal emails are subject to access by P & S Surgical Hospital • Log-off or lock your computer when you are not using it • Make sure others cannot view your computer screen
  • 14. HIPAA, HITECH, & YOU • Keep passwords secure • Use your own individual password • Avoid sharing passwords • Trigger encryption for emails containing PHI being sent outside the organization • If photos must be taken of a patient, use a P & S camera or device; NEVER use your personal camera or smart phone
  • 15. HIPAA, HITECH, & YOU • Never share proprietary or confidential information in blogs or on social media sites • Report potential breaches, inappropriate disclosures, or otherwise suspect behavior to your direct supervisor, the Privacy Officer, the Security Officer, or the Corporate Compliance Officer
  • 16. End of Presentation • This is the end of presentation. Click on blue Quiz button next.