Advanced HIPAA /19/2016. Today s Agenda. What is the HIPAA Privacy Rule? Abbie Miller, MCS-P

Size: px
Start display at page:

Download "Advanced HIPAA /19/2016. Today s Agenda. What is the HIPAA Privacy Rule? Abbie Miller, MCS-P"

Transcription

1 Advanced HIPAA 2016 Abbie Miller, MCS-P Today s Agenda A HIPAA eye toward social media and texting Please get your Business Associate agreements in order! Some definitions pertaining to HIPAA Privacy Dispose of patient information correctly New and existing employees must be trained, and it must be documented What is the HIPAA Privacy Rule? Standards that address the use and disclosure of individuals protected health information or PHI by covered entities Standards for individuals' privacy rights to understand and control how their health information is used 1

2 Should You Bother With Compliance? Cardiac Practice Fined for Not Shielding Patient Info Should You Bother With Compliance? Federal government has fined a Phoenix cardiac medical practice $100,000 for posting patient appt. information online Should You Bother With Compliance?..agreed to pay penalty to settle violations of HIPAA 2

3 Should You Bother With Compliance? HHS investigations found no policies and procedures and few safeguards to protect PHI Should You Bother With Compliance? also didn t have documentation of trained employees, no risk analysis conducted, no privacy or security official Some Definitions Covered Entity: any provider who transmits or receives health information in electronic form in connection with a covered electronic transaction. Business Associate (BA): A person or company that acts on behalf of a covered entity performing functions that involve the use or disclosure of PHI. Protected Health Information(PHI): Individually identifiable health information that is maintained or stored in electronic or any other form or medium. It includes demographic and financial information about the patient. Electronic Protected Health Information (ephi): Individually identifiable health information that is transmitted, maintained, or stored in electronic form. 3

4 7 Steps to Achieve Privacy Compliance 1. Install a Privacy Officer 2. Define Minimum Necessary for Your Office 3. Write HIPAA Privacy Policies and Procedures 4. Customize Your NPP (Notice of Privacy Practices) 5. Train Your Team Members 6. Monitor Your Active Privacy Program 7. Business Associate Agreements In Place Monitor Your Active Privacy Program Conduct Initial Program Audit Conduct Regular Self- Audits Privacy Program Audits NPP Acknowledgement Audits 1. Install a Privacy Officer Be careful to choose someone who: can understand the rules and guidelines that govern HIPAA can acquire all new HIPAA rules and regulations and stay updated on any changes can comfortably work alongside practice leadership personnel 4

5 1. Install a Privacy Officer Privacy Officer Role Develop, implement, maintain and assure adherence to the Privacy Policies and Procedures for your practice Privacy Officer Purpose Oversee the protection of PHI 1. Install a Privacy Officer 2. Minimum Necessary Standard The minimum necessary standard requires you to evaluate your practices and enhance any safeguards as needed to avoid and limit unnecessary or inappropriate access to and disclosure of PHI. 5

6 2. Minimum Necessary Standard The Privacy Rule requires you to take reasonable action to limit the use or disclosure of, as well as requests for, PHI to the minimum necessary to accomplish your intended purpose. 2. Minimum Necessary Standard Determine your own set of standards in P&P Entire medical record may be appropriate in certain circumstances Identify who needs access to PHI to carry out duties Identify specific categories of PHI for each group Does not apply to: Health care providers for treatment purposes The individual in question Those under authorization Disclosures to HHS Required by law Prior to 4/14/03 Common Uses and Disclosures: TPO Does not require signed authorization Must list on the NPP Treatment: Doctors can share information freely with each other Payment: billing and collections activities; determination of eligibility Healthcare Operations: Quality assurance, scheduling, auditing, and employee review 6

7 3. Write HIPAA Policies & Procedures You are required to have written HIPAA Policies and Procedures in place for a valid HIPAA Compliance Program in your office. 3. Write HIPAA Policies & Procedures Patient s Right to Restrict Disclosure Can request restriction of info to carry out payment or HCO Can restrict information given to a family member Not required to agree to the restriction. Special form should be used for documentation 7

8 3. Write HIPAA Policies & Procedures Authorizations: Non-TPO Selling a patient mailing list Employer disclosures Life insurance eligibility questionnaires Marketing and testimonials Must stipulate the approved use Have an expiration date 8

9 3. Write HIPAA Policies & Procedures Incidental Uses and Disclosures Unintentional Overhead phone conversations when answered at the front desk. A patient passing by another room where treatment is taking place Everyday operations 3. Write HIPAA Policies & Procedures Accidental Disclosures Faxing or ing PHI to the wrong destination Disclosing PHI to an unauthorized person If harmful, must be disclosed to the patient. Always included on non-tpo disclosure log 9

10 3. Write HIPAA Policies & Procedures Disclosure Logs and Accounting Patient may request accounting of all non- TPO disclosures All but incidental disclosures should be logged Not required for those with authorization, reporting neglect or abuse, law enforcement, or prior to 4/14/03 10

11 3. Write HIPAA Policies & Procedures Use of Photographs Permitted but must be out of public view As part of a testimonial or other marketing effort, you must have authorization Can include in electronic or paper form 3. Write HIPAA Policies & Procedures Faxes PRIVILEGED AND CONFIDENTIAL: This document and the information contained herein are confidential and protected from disclosure pursuant to federal law. This message is intended only for the use of the Addressee(s) and may contain information that is PRIVILEGED AND CONFIDENTIAL. If you are not the intended recipient, you are hereby notified that the use, dissemination, or copying of the information is strictly prohibited. If you have received this communication in error, please erase all copies of the message and its attachments and notify the sender immediately. 3. Write HIPAA Policies & Procedures s This , including any attachments, may include PRIVILEGED AND CONFIDENTIAL information and may be used only by the person or entity to which it is addressed. If the reader of this is not the intended recipient, or his or her authorized agent, the reader is hereby notified that any dissemination, distribution, or copying of this is prohibited. If you have received this in error, please notify the sender by replying to this message, and delete this immediately. 11

12 3. Write HIPAA Policies & Procedures Debt Collection Permitted use of debt collection services Falls under payment Even skip tracing has been approved by HHS as routine 3. Write HIPAA Policies & Procedures Safeguards: Common Sense 3. Write HIPAA Policies & Procedures What s OK? Sign in sheets: minimal information name, time, etc. Verification of Callers: PHI over phone-- Password, SSN, DOB, Zip, Maiden Name Social Security Number: use sparingly, or last four digits only 12

13 3. Write HIPAA Policies & Procedures Phone Messages/ Appt. Reminders Reminders are good Postcards are ok Answering machines are ok Do not leave PHI on the call, or results of test OK to say that you are reminding of an appointment and date/time Should include that information in the NPP 3. Write HIPAA Policies & Procedures More Common Sense Not required: Private rooms Soundproof rooms Wireless encryption Encrypted telephones A good idea: Have patients wait a few steps back from counter Curtains or screens Speaking quietly Files turned backward Folders marked confidential All faxes/ that contain PHI marked confidential Fax machines secure locations 3. Write HIPAA Policies & Procedures EOB s and COB s When coordinating benefits, blacken any other patient s PHI on EOB Clear out anything that does not apply to the claim Otherwise is a violation of HIPAA law. 13

14 3. Write HIPAA Policies & Procedures Oral Communication Overheard conversations are unavoidable Phone conversations are ok Training situations Calling out patient s name is not a violation 3. Write HIPAA Policies & Procedures Patient s Right to Access Information Patient will request in writing Must act upon this within 30 days if onsite, 60 if written notice Can be in summary form if agreed to May charge a reasonable fee 3. Write HIPAA Policies & Procedures Destruction of Medical Records You are responsible for wrongful disclosures due to improper disposal of PHI. Shred, get receipt Erase Proper disposal 14

15 3. Write HIPAA Policies. & Procedures Copying Fees Most state laws provide a maximum that can be charged for copying medical records. NPP says first request in 12 months is free 3. Write HIPAA Policies & Procedures Other Patient Rights Can submit amendment to record, not a change Must consider amendment, don t have to accept Can designate a personal rep Deceased-legal rep Parent usually for minor 3. Write HIPAA Policies & Procedures Disclosures to Law Enforcement CAN NOT disclose DNA information to law enforcement trying to locate an individual May use your own policies for the good of the patient Victims of domestic violence/abuse Privacy Rule does not interfere with federal or state laws 15

16 3. Write HIPAA Policies & Procedures Privacy Complaints Handled by your office Privacy Compliance Officer Patients may not be forced to waive their right to complaints as a condition of treatment Step 1: PCO formally files complaint within their office-complaint form Step 2: PCO tries to resolve complaint within their office Step 3: If patient persists, instruct to file with Office for Civil Rights 3. Write HIPAA Policies & Procedures 3. Write HIPAA Policies & Procedures Have a policy & procedure for every area of PHI risk as well as for patient rights Include: Faxes & s Phone calls Neglect/abuse Etc. 16

17 4. Customize Your NPP (Notice of Privacy Practices) HIPAA gives your patients a right to be informed of the privacy practices of your office HIPAA gives patients the ability to be informed of their rights concerning HIPAA privacy 4. Customize Your NPP (Notice of Privacy Practices) A statement from the provider to the patient on how the patient s PHI will be handled and protected by the office. Must be provided on or before the first delivery of service, except in an emergency. 17

18 4. Customize Your NPP (Notice of Privacy Practices) Must make a good faith attempt to obtain a written acknowledgement that they have received a copy of your NPP. 5. Train Your Team Members Ongoing training required, updates Access PHI on need to know basis Keep employment records separate from treatment records Fully explain sanctions for failure to comply. 18

19 19

20 6. Monitor Your Active Privacy Program Conduct Initial Program Audit Conduct Regular Self- Audits Privacy Program Audits NPP Acknowledgement Audits Audit Your Privacy Program 20

21 Audit Privacy Safeguards Audit Privacy in Patient Charts - NPP 7. Business Associate Agreements Must comply directly with HIPAA Privacy A person or entity that provides certain functions on behalf of the covered entity Not a member of the provider s work force A CE who discloses PHI to providers for TX are NOT business associates 21

22 Who are Business Associates? Vendors or other external entities that are considered business associates must also be considered part of a healthcare organization's security plan. All linked organizations should be properly identified and have signed a business associate agreement. This will ensure all involved parties are aware of what is mandated by HIPAA. Internal policies such as privacy notices and breach notifications should not be overlooked because they are as critical as the technology aspect. 7. Business Associate Agreements The Privacy Rule requires that you obtain satisfactory assurances from your business associate that they will appropriately safeguard the PHI it receives or creates on behalf of your office. The satisfactory assurances must be in writing in the form of a contract or other agreement between yourself and the business associate. 7. Business Associate Agreements Examples are billing companies, consultants, auditors, clearing house, attorney, collection agency, document shredders, answering service, contractors, software vendor, offsite record storage. 22

23 HIPAA Omnibus Rule - BAA You no longer have to report failures of your BAs BAs are DIRECTLY liable for these violations BAs are responsible for their subcontractors BAs MUST comply with Security and Breach Notification rules YOU ARE RESPONSIBLE FOR THE AGREEMENT!! HIPAA Omnibus Rule - BAA You had until Sept 23, 2014 to bring all BAA up to date and in conformance with new rules. Agreements in place prior to March 26, 2013 remain compliant until renewed or modified or Sept 23, /2014--HIPAA Omnibus Rule - BAA You MUST review your relationships and determine if a BAA is needed Does your associate create, receive, maintain, store, or transmit PHI on your behalf? 23

24 Epic Fail 24

25 Purpose of HIPAA Security Protect ephi Electronic Protected Health Information Confidentiality Integrity Availability 7 Steps to Achieve Security Compliance 1. Install a Security Officer 2. Understand the rules 3. Make a list of ephi 4. Conduct a Risk Analysis 5. Implement policies & procedures 6. Deliver security awareness training 7. Monitor ongoing security processes Step 1: Install a Security Officer Be careful to choose someone who: can understand the rules and guidelines that govern HIPAA can acquire all new HIPAA rules and regulations and stay updated on any changes 25

26 Step 1: Install a Security Officer Be careful to choose someone who: will be able to comfortably work alongside practice leadership personnel is technologically savvy Step 1: Install a Security Officer Step 2: Understanding the Rules: Who Must Comply & How any provider who sends or receives ephi electronically covered entities must adopt measures to safeguard ephi 26

27 Step 2: Understanding the Rules: Types of Safeguards Administrative Safeguards Physical Safeguards Technical Safeguards Step 2: Understanding the Rules: Security Controls Administrative Controls Physical Controls Technical Controls Step 2: Understanding the Rules: Security Principles Comprehensiveness Scalability Technology Neutrality 27

28 Step 3: List ephi: Your Information Systems Step 4: Perform a Risk Analysis Standard #2 Security Management Process Risk Analysis is an Implementation Specification Required 6 Steps to Risk Analysis Understand your information systems Identify threats in your environment Identify vulnerabilities that threats could attack 28

29 6 Steps to Risk Analysis Identify probability that a threat could attack, analyze the criticality of impact, and summarize risk Implement applicable measure Document your process and results Your Risk Analysis Step 5: Policies & Procedures: HIPAA relies on standard business practices for policy development Procedures are step-by-step instructions that implement the policies 29

30 Step 5: Policies & Procedures: Workforce Security You must provide only the minimum necessary access to ephi that is necessary for a team member to do his/her job. Step 5: Policies & Procedures: Workforce Security Step 5: Policies & Procedures: Workforce Security 30

31 Step 5: Policies & Procedures: Contingency Plan A Contingency Plan is needed to implement strategies for recovering ephi should an office have an emergency or occurrence that disrupts critical business operations. ephi must be available when needed, and your contingency planning determines what is necessary in the event of a power outage or other occurrence. Step 5: Policies & Procedures: Contingency Plan You must establish and implement, as needed, policies and procedures for responding to emergencies ( Your Contingency Plan must include Disaster Recovery Plan and Emergency Mode Operations Plan Step 5: Policies & Procedures: Contingency Plan 31

32 Step 6: Policies & Procedures: Train Your Team Members Step 7: Monitoring Ongoing Security Processes Ensure your security plans, policies and procedures continue to adequately protect your ephi Implement an ongoing monitoring and evaluation plan A technical and nontechnical evaluation of your security controls and processes must be done to document any needs for change 32

33 Step 7: Monitoring Ongoing Security Processes All appropriate areas and employees must be included in the evaluation. When an environmental or operational change has occurred that could significantly affect your ephi, you must conduct an evaluation. Step 7: Monitoring Ongoing Security Processes: Breach Notification Step 7: Monitoring Ongoing Security Processes: Self Audits 33

34 Are you in HIPAA Denial? HIPAA is something I can get to when I m not busy I did my HIPAA-thing in 2003, I m all set. No one is REALLY going to check my program I m a small provider HIPAA is too complicated, they don t expect me to do this Time to Act! Time to Act! 34

35 Timeline HIPAA HITECH OMNIBUS HITECH Expansion Reach obefore: Covered Entities: healthcare organizations oafter: Covered Entities: expanded to business associates Economics HITECH Expansion obefore: ,000 cases reported, no one fined; in 2009, CVS fined $2.25 M- Daily fine: $100/day oafter: Fines up to $1.5 M / year; regulators at HHS now benefit directly from fines levied (significant uptick in fines) Daily fine: $50,000/day 35

36 HITECH Act Further expanded the businesses covered by HIPAA Privacy and Security Rules by beefing up BA agreements Required all to comply with redefined security breach notification rules Enhanced penalties that can be handed down, and increases enforcement Widened the scope of Privacy and Security protections available under HIPAA; Increased potential legal liability for noncompliance; Provided more enforcement of HIPAA rules. HITECH Act Omnibus Final Rule March 26, 2013 September 23,

37 Know Your State Laws If your state privacy and confidentiality laws are more stringent then HIPAA laws, you must comply to which has the highest level of protection. Omnibus: Three Main Focuses Privacy, Security, and Breach Notification policies and procedures Notice of Privacy Practices Business Associate Agreements HIPAA Omnibus Rule - Breach Redefines Breach Harder to avoid reporting a breach Redefines: significant risk of financial, reputational, or other harm 37

38 HIPAA Omnibus Rule - Breach Breaches presumed reportable unless after performing a risk assessment (applying four factors) it is determined there is a low probability of PHI compromise HIPAA Omnibus Rule - Breach 1) Nature and extent of the PHI involved consider: Sensitivity of the information from a financial or clinical prospective Likelihood the information can be reidentified HIPAA Omnibus Rule - Breach 2) The person who obtained the unauthorized access consider: Does this person have an independent obligation to protect the confidentiality of the information 38

39 HIPAA Omnibus Rule - Breach 3) Whether the PHI was actually acquired or accessed consider: Was the exposed PHI actually accessed by anyone who may have had the ability to access or acquire HIPAA Omnibus Rule - Breach 4) The extent to which the risk has been mitigated consider: Getting a signed confidentiality agreement from the recipient HIPAA Omnibus Rule - Breach No need for independent entity to conduct risk assessment No need to conduct assessment if notification is made Take steps to reduce risks in future Must still adhere to requirements for individual notification, HHS notification, and media posting where applicable 39

40 HIPAA Omnibus Rule - Disclosures At the patients request, you may NOT disclose information to a patient s health plan if they have paid out of pocket for their care. HIPAA Omnibus Rule - Disclosures 40

41 HIPAA Omnibus Rule - Marketing New rules limit circumstances when you can provide marketing communication to your patients WITHOUT written authorization HIPAA Omnibus Rule - Marketing 1) the physician receives no compensation for the communication; 2) the communication is face-to-face; 3) the communication involves a drug or biologic the patient is currently being prescribed and the payment is limited to reasonable reimbursement of the costs of the communication (no profit); HIPAA Omnibus Rule - Marketing 4) the communication involves general health promotion, rather than the promotion of a specific product or service; or 5) the communication involves government or government-sponsored programs. Physicians are still permitted to give patients promotional gifts of nominal value. 41

42 HIPAA Omnibus Rule - Copies Changes to timeframes and fees for patient s written requests of PHI You have 30 days (with ONE 30 day extension) HIPAA Omnibus Rule - Copies Must provide access to EHR and other electronic records in electronic form of patient requests readily reproducible Otherwise, must be in another mutually agreed upon electronic format Hard copies only ok when individual refuses all e- formats HIPAA Omnibus Rule - Copies You must consider transmission security when ing PHI You can send in unencrypted if the patient is made aware of risks and still requests 42

43 HIPAA Omnibus Rule - Copies New rule modified the costs that may be charged to the patient for copies include labor costs supply costs if the patient requests a paper copy if electronic, the cost of any portable media (such as a USB memory stick or a CD) Must follow state law if a lower reimbursement rate is set. HIPAA Omnibus Rule - NPP NPP must be update NPP Include: New breach notification guidelines Updated patient rights concerning disclosures to health plans Marketing using PHI HIPAA Omnibus Rule - NPP Post revised NPP Make copies available All new patients Anyone who requests Post new NPP to website 43

44 Acknowledgement (Notice of Privacy Practices) Must make a good faith attempt to obtain a written acknowledgement that they have received a copy of your NPP. 44

45 New Rules Game Changer?! This final omnibus rule marks the most sweeping changes to the HIPAA Privacy and Security Rules since they were first implemented, said HHS Office for Civil Rights Director Leon Rodriguez. These changes not only greatly enhance a patient s privacy rights and protections, but also strengthen the ability of my office to vigorously enforce the HIPAA privacy and security protections, regardless of whether the information is being held by a health plan, a health care provider, or one of their business associates. HIPAA Omnibus Rule - Vigorous Enforcement Unaware of violation - $100 to $50,000 Reasonable cause violation - $1,000 to $50,000 Willful neglect - $10,000 to $50,000 Willful neglect - $50,000 to $1.5 million Multiple HIPAA violations - surpass $1.5 million. 45

46 Does Enforcement Happen? Massachusetts provider settles HIPAA case for $1.5 million Massachusetts Eye and Ear Infirmary and Massachusetts Eye and Ear Associates, Inc. (collectively referred to as MEEI ) has agreed to pay the U.S. Department of Health and Human Services (HHS) $1.5 million to settle potential violations of the HIPAA Privacy and Security Rules. MEEI has also agreed to take corrective action to improve policies and procedures to safeguard the privacy and security of their patients protected health information and retain an independent monitor to report on MEEI s compliance efforts. OCR s investigation followed a breach report submitted by MEEI, as required by the HIPAA Breach Notification Rule, reporting the theft of an unencrypted personal laptop containing the electronic protected health information (ephi) of MEEI patients and research subjects. The information contained on the laptop included patient prescriptions and clinical information. OCR s investigation indicated that while MEEI s management was aware of the Security Rule, MEEI failed to take necessary steps to comply with the requirements of the Rule, such as such as conducting a thorough analysis of the risk to the confidentiality of ephi maintained on portable devices, implementing security measures sufficient to ensure the confidentiality of ephi that MEEI created, maintained, and transmitted using portable devices, adopting and implementing policies and procedures to restrict access to ephi to authorized users of portable devices, and adopting and implementing policies and procedures to address security incident identification, reporting, and response. Does Enforcement Happen? HHS Settles with Health Plan in Photocopier Breach Case Under a settlement with the U.S. Department of Health and Human Services (HHS), Affinity Health Plan, Inc. will settle potential violations of the HIPAA Privacy and Security Rules for $1,215,780. OCR s investigation indicated that Affinity impermissibly disclosed the protected health information of up to 344,579 individuals when it returned multiple photocopiers to a leasing agent without erasing the data contained on the copier hard drives. In addition, the investigation revealed that Affinity failed to incorporate the electronic protected health information stored in copier s hard drives in its analysis of risks and vulnerabilities as required by the Security Rule, and failed to implement policies and procedures when returning the hard drives to its leasing agents. HIPAA Social Media and Texting Woes In today s world of Social Media dominance, it s easy to forget that HIPAA violations are a real concern Texting is also considered electronic means 46

47 Scenario #1 Associate doctor leaves to open new clinic Calls his buddy the CA and asks her to take pictures of a patient s x-rays and text them because he doesn t have time to wait for them to send them through the mail Scenario #2 CA posts on Facebook Just met (name of famous football player) he is such a nice guy Friend replies, How did you meet? CA replies, Came in to get adjusted for low back problem Profile reveals CA works at ABC Chiropractic General Rules of Thumb Don t talk about patients, even in general terms. It s too easy to identify patients by geography, circumstances, etc. A simple slip up can have far-reaching effects 47

48 General Rules of Thumb When providing educational content on your site, blog or Facebook page, avoid specifics OK to be general like, Low back concerns of XYZ nature often present with these symptoms Never point out a specific case with any particulars that could be traced back to a patient If you wouldn t say it in the elevator, don t put it online. You can try speaking your post out loud before hitting the enter key. You are always representing your office and your profession General Rules of Thumb General Rules of Thumb Don t mix your personal and professional lives. Use separate accounts for your personal and professional lives Don t friend patients on Facebook Check privacy settings often and assume that anything you put online could become public If you want to have a professional presence on Facebook, create a page apart from your personal account 48

49 General Rules of Thumb Only use your cell phone for business texts if PW protected Don t use for appointment scheduling or for having a whole conversation about a condition This becomes part of the medical record Need to be able to track and document Record Retention HIPAA related documents are retained for 6 years Applies to authorizations, audit records, CA agreements, and contracts Destruction of Medical Records You are responsible for wrongful disclosures due to improper disposal of PHI. Shred, get receipt Erase Proper disposal not sitting around in office 49

50 Know What Happens if you Sell Your Practice HIPAA allows for the exchange of PHI without a written release between current and prior, or contemporaneously treating Does not permit the handover of PHI from one doctor to another, without the patient s written permission, when a practice is being sold Dr. A does not know if all of his/her former patients are going to treat with Doctor B. For this reason, Dr. A cannot just hand over patients confidential records to Dr. B Just handing the records over to the purchasing practitioner or corporate entity may seem expedient, but it is a HIPAA violation Possible Solutions Patients may not stay with new provider May make sense for the purchasing practitioner to agree to retain the records on site, essentially providing storage services for the selling practitioner s records Seller and purchaser enter into a contractual agreement that the purchaser will provide the seller with access to the physical record upon reasonable notice (such as two business days), and that the purchaser will not release or dispose of any original records without the seller s written permission As a part of this process, it will be necessary for seller and purchaser to execute a BAA, which helps ensure compliance with HIPAA s requirements Authorization is Required Patients who elect to stay with new provider can sign authorization New provider can then legally access the stored records Authorization is kept on file 50

51 HIPAA is a Process Not an Event Implementation requires commitment Don t try to do it alone Realize, that like OIG Compliance it s a process that will be ongoing, evergreen Take the first step to update what you have in place with these new forms and procedures Have fun! Helping Increase Paperwork Across America! Need Help? info@kmcuniversity.com 51

Abbie Miller, MCS-P. Ongoing Internal Auditing. Documentation Reviews 5/16/2015.

Abbie Miller, MCS-P. Ongoing Internal Auditing. Documentation Reviews 5/16/2015. Protect Your Practice with Innovative Risk Management Techniques updated with HIPAA Hi-Tech Act and Omnibus Rule Presented by: Abbie Miller, MCS-P Abbie Miller, MCS-P 16 years experience in a Chiropractic

More information

HIPAA & Privacy Compliance Update

HIPAA & Privacy Compliance Update HIPAA & Privacy Compliance Update Vermont Medical Society FREE Wednesday Webinar Series March 15, 2017 Anne Cramer and Shireen Hart Primmer Piper Eggleston & Cramer PC acramer@primmer.com shart@primmer.com

More information

Putting It All Together:

Putting It All Together: Putting It All Together: The Interplay of Privacy & Security Regina Verde, MS, MBA, CHC Chief Corporate Compliance & Privacy Officer University of Virginia Health System 2017 ISPRO Conference October 24,

More information

HIPAA Security and Privacy Policies & Procedures

HIPAA Security and Privacy Policies & Procedures Component of HIPAA Security Policy and Procedures Templates (Updated for HITECH) Total Cost: $495 Our HIPAA Security policy and procedures template suite have 71 policies and will save you at least 400

More information

HIPAA How to Comply with Limited Time & Resources. Jonathan Pantenburg, MHA, Senior Consultant August 17, 2017

HIPAA How to Comply with Limited Time & Resources. Jonathan Pantenburg, MHA, Senior Consultant August 17, 2017 HIPAA How to Comply with Limited Time & Resources Jonathan Pantenburg, MHA, Senior Consultant JPantenburg@Stroudwater.com August 17, 2017 Stroudwater Associates is a leading national healthcare consulting

More information

HIPAA FOR BROKERS. revised 10/17

HIPAA FOR BROKERS. revised 10/17 HIPAA FOR BROKERS revised 10/17 COURSE PURPOSE The purpose of this information is to help ensure that all Optima Health Brokers are prepared to protect the privacy and security of our members health information.

More information

The HIPAA Omnibus Rule

The HIPAA Omnibus Rule The HIPAA Omnibus Rule What You Should Know and Do as Enforcement Begins Rebecca Fayed, Associate General Counsel and Privacy Officer Eric Banks, Information Security Officer 3 Biographies Rebecca C. Fayed

More information

HIPAA Privacy & Security Training. Privacy and Security of Protected Health Information

HIPAA Privacy & Security Training. Privacy and Security of Protected Health Information HIPAA Privacy & Security Training Privacy and Security of Protected Health Information Course Competencies: This training module addresses the essential elements of maintaining the HIPAA Privacy and Security

More information

Inside the OCR Investigation/Audit Process 2018 PBI HEALTH LAW INSTITUTE TUESDAY, MARCH 13, 2017 GREGORY M. FLISZAR, J.D., PH.D.

Inside the OCR Investigation/Audit Process 2018 PBI HEALTH LAW INSTITUTE TUESDAY, MARCH 13, 2017 GREGORY M. FLISZAR, J.D., PH.D. Inside the OCR Investigation/Audit Process 2018 PBI HEALTH LAW INSTITUTE TUESDAY, MARCH 13, 2017 GREGORY M. FLISZAR, J.D., PH.D. HIPAA GENERAL RULE PHI may not be disclosed without patient authorization

More information

Update on HIPAA Administration and Enforcement. Marissa Gordon-Nguyen, JD, MPH October 7, 2016

Update on HIPAA Administration and Enforcement. Marissa Gordon-Nguyen, JD, MPH October 7, 2016 Update on HIPAA Administration and Enforcement Marissa Gordon-Nguyen, JD, MPH October 7, 2016 Updates Policy Development Breaches Enforcement Audit 2 POLICY DEVELOPMENT RECENTLY PUBLISHED: RIGHT OF ACCESS,

More information

HIPAA Privacy and Security Training Program

HIPAA Privacy and Security Training Program Note The following HIPAA training is intended for Vendors, Business Associates, Students, Pre Approved Shadowers, and Visitors. The following training module does not provide credit for annual training

More information

WASHINGTON UNIVERSITY HIPAA Privacy Policy # 7. Appropriate Methods of Communicating Protected Health Information

WASHINGTON UNIVERSITY HIPAA Privacy Policy # 7. Appropriate Methods of Communicating Protected Health Information WASHINGTON UNIVERSITY HIPAA Privacy Policy # 7 Appropriate Methods of Communicating Protected Health Information Statement of Policy Washington University and its member organizations (collectively, Washington

More information

The Relationship Between HIPAA Compliance and Business Associates

The Relationship Between HIPAA Compliance and Business Associates The Relationship Between HIPAA Compliance and Business Associates 1 HHS Wall of Shame 20% Involved Business Associates Based on HHS Breach Portal: Breaches Affecting 500 or More Individuals, Type of Breach

More information

HIPAA Compliance: What it is, what it means, and what to do about it. Adam Carlson, Security Solutions Consultant Intapp

HIPAA Compliance: What it is, what it means, and what to do about it. Adam Carlson, Security Solutions Consultant Intapp HIPAA Compliance: What it is, what it means, and what to do about it. Adam Carlson, Security Solutions Consultant Intapp Agenda Introductions HIPAA Background and History Overview of HIPAA Requirements

More information

HIPAA For Assisted Living WALA iii

HIPAA For Assisted Living WALA iii Table of Contents The Wisconsin Assisted Living Association... ix Mission... ix Vision... ix Values... ix Acknowledgments... ix Who Should Use This Manual... x How to Use This Manual... x Updates and Forms...

More information

How Secure Do You Feel About Your HIPAA Compliance Plan? Daniel F. Shay, Esq.

How Secure Do You Feel About Your HIPAA Compliance Plan? Daniel F. Shay, Esq. How Secure Do You Feel About Your HIPAA Compliance Plan? Daniel F. Shay, Esq. Word Count: 2,268 Physician practices have lived with the reality of HIPAA for over twenty years. In that time, it has likely

More information

DATA PRIVACY & SECURITY THE CHANGING HIPAA CLIMATE

DATA PRIVACY & SECURITY THE CHANGING HIPAA CLIMATE DATA PRIVACY & SECURITY THE CHANGING HIPAA CLIMATE Melodi (Mel) M. Gates mgates@pattonboggs.com (303) 894-6111 October 25, 2013 THE CHANGING PRIVACY CLIMATE z HEALTH INSURANCE PORTABILITY & ACCOUNTABILITY

More information

Security and Privacy Breach Notification

Security and Privacy Breach Notification Security and Privacy Breach Notification Version Approval Date Owner 1.1 May 17, 2017 Privacy Officer 1. Purpose To ensure that the HealthShare Exchange of Southeastern Pennsylvania, Inc. (HSX) maintains

More information

HIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012

HIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012 HIPAA Privacy and Security Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012 Goals and Objectives Course Goal: Can serve as annual HIPAA training for physician practice

More information

WHITE PAPER. HIPAA Breaches Continue to Rise: Avoid Becoming a Casualty

WHITE PAPER. HIPAA Breaches Continue to Rise: Avoid Becoming a Casualty WHITE PAPER HIPAA Breaches Continue to Rise: Avoid Becoming a Casualty WHITE PAPER HIPAA Breaches Continue to Rise: Avoid Becoming a Casualty By Jill Brooks, MD, CHCO and Katelyn Byrne, BSN, RN Data Breaches

More information

Healthcare Privacy and Security:

Healthcare Privacy and Security: Healthcare Privacy and Security: Breach prevention and mitigation/ Insuring for breach Colin J. Zick Foley Hoag LLP (617) 832-1000 www.foleyhoag.com www.securityprivacyandthelaw.com Boston Bar Association

More information

Lesson Three: False Claims Act and Health Insurance Portability and Accountability Act (HIPAA)

Lesson Three: False Claims Act and Health Insurance Portability and Accountability Act (HIPAA) Lesson Three: False Claims Act and Health Insurance Portability and Accountability Act (HIPAA) Introduction: Welcome to Honesty and Confidentiality Lesson Three: The False Claims Act is an important part

More information

The HIPAA Security & Privacy Rule How Municipalities Can Prepare for Compliance

The HIPAA Security & Privacy Rule How Municipalities Can Prepare for Compliance The HIPAA Security & Privacy Rule How Municipalities Can Prepare for Compliance Russell L. Jones Partner Health Sciences Sector Deloitte & Touche LLP Security & Privacy IMLA 2013 Annual Conference San

More information

HIPAA-HITECH: Privacy & Security Updates for 2015

HIPAA-HITECH: Privacy & Security Updates for 2015 South Atlantic Regional Annual Conference Orlando, FL February 6, 2015 1 HIPAA-HITECH: Privacy & Security Updates for 2015 Darrell W. Contreras, Esq., LHRM Gregory V. Kerr, CHPC, CHC Agenda 2 OCR On-Site

More information

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers All Affiliate Research Policy Subject: HIPAA File Under: For Researchers ORA HIPAA Issuing Department: Office of Research Administration Original Policy Date Page 1 of 5 Approved by: May 9,2005 Revision

More information

HIPAA Compliance Officer Training By HITECH Compliance Associates. Building a Culture of Compliance

HIPAA Compliance Officer Training By HITECH Compliance Associates. Building a Culture of Compliance HIPAA Compliance Officer Training By HITECH Compliance Associates Building a Culture of Compliance Your Instructor Is Michael McCoy Nationally Recognized HIPAA Expert » Nothing contained herein should

More information

Checklist: Credit Union Information Security and Privacy Policies

Checklist: Credit Union Information Security and Privacy Policies Checklist: Credit Union Information Security and Privacy Policies Acceptable Use Access Control and Password Management Background Check Backup and Recovery Bank Secrecy Act/Anti-Money Laundering/OFAC

More information

HIPAA UPDATE. Michael L. Brody, DPM

HIPAA UPDATE. Michael L. Brody, DPM HIPAA UPDATE Michael L. Brody, DPM Objectives: How to respond to a patient s request for a copy of their records. Understand your responsibilities after you send information out to another doctor, hospital

More information

HIPAA Federal Security Rule H I P A A

HIPAA Federal Security Rule H I P A A H I P A A HIPAA Federal Security Rule nsurance ortability ccountability ct of 1996 HIPAA Introduction - What is HIPAA? HIPAA = The Health Insurance Portability and Accountability Act A Federal Law Created

More information

HIPAA ( ) HIPAA 2017 Compliancy Group, LLC

HIPAA ( ) HIPAA 2017 Compliancy Group, LLC 855 85 HIPAA (855-854-4722) www.compliancygroup.com 1 Started in 2005 by HIPAA auditors & Compliance experts Market need for a total end client solution Created The Guard: cloud-based solution Compliance

More information

Preventing Breaches When Using , Telephone and Fax Machines

Preventing Breaches When Using  , Telephone and Fax Machines Preventing Breaches When Using E-mail, Telephone and Fax Machines Harley HIPAA Presented by the UAMS HIPAA Office, July 26, 2011 Breach Reporting When a use or disclosure occurs that is not allowed by

More information

HIPAA Privacy, Security and Breach Notification

HIPAA Privacy, Security and Breach Notification HIPAA Privacy, Security and Breach Notification HCCA East Central Regional Annual Conference October 2013 Disclaimer The information contained in this document is provided by KPMG LLP for general guidance

More information

Policy and Procedure: SDM Guidance for HIPAA Business Associates

Policy and Procedure: SDM Guidance for HIPAA Business Associates Policy and Procedure: SDM Guidance for HIPAA Business (Adapted from UPMC s Guidance for Business at http://www.upmc.com/aboutupmc/supplychainmanagement/documents/guidanceforbusinessassociates.pdf) Effective:

More information

HIPAA COMPLIANCE AND DATA PROTECTION Page 1

HIPAA COMPLIANCE AND DATA PROTECTION Page 1 HIPAA COMPLIANCE AND DATA PROTECTION info@resultstechnology.com 877.435.8877 Page 1 CONTENTS Introduction..... 3 The HIPAA Security Rule... 4 The HIPAA Omnibus Rule... 6 HIPAA Compliance and RESULTS Cloud

More information

Federal Breach Notification Decision Tree and Tools

Federal Breach Notification Decision Tree and Tools Federal Breach Notification and Tools Disclaimer This document is copyright 2009 by the Long Term Care Consortium (LTCC). These materials may be reproduced and used only by long-term health care providers

More information

HIPAA in 2017: Hot Topics You Can t Ignore. Danika Brinda, PhD, RHIA, CHPS, HCISPP March 16, 2017

HIPAA in 2017: Hot Topics You Can t Ignore. Danika Brinda, PhD, RHIA, CHPS, HCISPP March 16, 2017 HIPAA in 2017: Hot Topics You Can t Ignore Danika Brinda, PhD, RHIA, CHPS, HCISPP March 16, 2017 Breach Notification State Law Privacy Rule Authorizations Polices and Procedures The Truth Is Have created

More information

Boerner Consulting, LLC Reinhart Boerner Van Deuren s.c.

Boerner Consulting, LLC Reinhart Boerner Van Deuren s.c. Catherine M. Boerner, Boerner Consulting LLC Heather Fields, 1 Discuss any aggregate results of the desk audits Explore the Sample(s) Requested and Inquire of Management requests for the full on-site audits

More information

HIPAA. Developed by The University of Texas at Dallas Callier Center for Communication Disorders

HIPAA. Developed by The University of Texas at Dallas Callier Center for Communication Disorders HIPAA Developed by The University of Texas at Dallas Callier Center for Communication Disorders Purpose of this training Everyone with access to Protected Health Information (PHI) must comply with HIPAA

More information

HIPAA/HITECH Act Update HCCA South Central Regional Annual Conference December 2, Looking Back at 2011

HIPAA/HITECH Act Update HCCA South Central Regional Annual Conference December 2, Looking Back at 2011 HIPAA/HITECH Act Update HCCA South Central Regional Annual Conference December 2, 2012 Phyllis F. Granade The Granade Law Firm Atlanta, GA (678) 705 2507 pgranade@granadelaw.com www.granadelaw.com Looking

More information

HIPAA and HIPAA Compliance with PHI/PII in Research

HIPAA and HIPAA Compliance with PHI/PII in Research HIPAA and HIPAA Compliance with PHI/PII in Research HIPAA Compliance Federal Regulations-Enforced by Office of Civil Rights State Regulations-Texas Administrative Codes Institutional Policies-UTHSA HOPs/IRB

More information

Employee Security Awareness Training Program

Employee Security Awareness Training Program Employee Security Awareness Training Program Date: September 15, 2015 Version: 2015 1. Scope This Employee Security Awareness Training Program is designed to educate any InComm employee, independent contractor,

More information

David C. Marshall, Esq. PACAH 2017 Spring Conference April 27, 2017

David C. Marshall, Esq. PACAH 2017 Spring Conference April 27, 2017 David C. Marshall, Esq. PACAH 2017 Spring Conference April 27, 2017 Privacy and security of patient information held by health care providers remains a concern of the federal government. More resources

More information

University of Wisconsin-Madison Policy and Procedure

University of Wisconsin-Madison Policy and Procedure Page 1 of 10 I. Policy The Health Information Technology for Economic and Clinical Health Act regulations ( HITECH ) amended the Health Information Portability and Accountability Act ( HIPAA ) to establish

More information

The ABCs of HIPAA Security

The ABCs of HIPAA Security The ABCs of HIPAA Security Daniel F. Shay, Esq 24 th Annual Health Law Institute Pennsylvania Bar Institute March 13, 2018 c. 2018 Alice G. Gosfield and Associates PC 1 Daniel F. Shay, Esq. Alice G. Gosfield

More information

HIPAA Tips and Advice for Your. Medical Practice

HIPAA Tips and Advice for Your. Medical Practice HIPAA Tips and Advice for Your Ericka L. Adler Medical Practice Rachel V. Rose WHY Header HIPAA PATIENT and Medical PORTALS? Practices HIPAA Basics Who is a covered entity? What is PHI? When can you disclose

More information

Red Flags/Identity Theft Prevention Policy: Purpose

Red Flags/Identity Theft Prevention Policy: Purpose Red Flags/Identity Theft Prevention Policy: 200.3 Purpose Employees and students depend on Morehouse College ( Morehouse ) to properly protect their personal non-public information, which is gathered and

More information

EXHIBIT A. - HIPAA Security Assessment Template -

EXHIBIT A. - HIPAA Security Assessment Template - Department/Unit: Date: Person(s) Conducting Assessment: Title: 1. Administrative Safeguards: The HIPAA Security Rule defines administrative safeguards as, administrative actions, and policies and procedures,

More information

Breach Notification Remember State Law

Breach Notification Remember State Law Breach Notification HITECH: First federal law mandating breach notification for health care industry Applies to covered entities, business associates, PHR vendors, and PHR service providers FTC regulates

More information

The simplified guide to. HIPAA compliance

The simplified guide to. HIPAA compliance The simplified guide to HIPAA compliance Introduction HIPAA, the Health Insurance Portability and Accountability Act, sets the legal requirements for protecting sensitive patient data. It s also an act

More information

NMHC HIPAA Security Training Version

NMHC HIPAA Security Training Version NMHC HIPAA Security Training 2017 Version HIPAA Data Security HIPAA Data Security is intended to provide the technical controls to ensure electronic Protected Health Information (PHI) is kept secure and

More information

Core Elements of HIPAA The Privacy Rule establishes individuals privacy rights and addresses the use and disclosure of protected health information ( PHI ) by covered entities and business associates The

More information

HPE DATA PRIVACY AND SECURITY

HPE DATA PRIVACY AND SECURITY ARUBA, a Hewlett Packard Enterprise company, product services ( Services ) This Data Privacy and Security Agreement ("DPSA") Schedule governs the privacy and security of Personal Data by HPE in connection

More information

A Checklist for Compliance in the Cloud 1. A Checklist for Compliance in the Cloud

A Checklist for Compliance in the Cloud 1. A Checklist for Compliance in the Cloud A Checklist for Compliance in the Cloud 1 A Checklist for Compliance in the Cloud A Checklist for Compliance in the Cloud 1 With the industrialization of hacking and the enormous impact of security breaches,

More information

Into the Breach: Breach Notification Requirements in the Wake of the HIPAA Omnibus Rule

Into the Breach: Breach Notification Requirements in the Wake of the HIPAA Omnibus Rule Into the Breach: Breach Notification Requirements in the Wake of the HIPAA Omnibus Rule The Twenty-Second National HIPAA Summit Healthcare Privacy and Security After HITECH and Health Reform Rebecca Williams,

More information

DON T GET STUNG BY A BREACH! WHAT'S NEW IN HIPAA PRIVACY AND SECURITY

DON T GET STUNG BY A BREACH! WHAT'S NEW IN HIPAA PRIVACY AND SECURITY DON T GET STUNG BY A BREACH! WHAT'S NEW IN HIPAA PRIVACY AND SECURITY Practice Areas: Healthcare Labor and Employment JASON YUNGTUM jyungtum@clinewilliams.com (402) 397 1700 Practice Areas: Healthcare

More information

HIPAA Security. 1 Security 101 for Covered Entities. Security Topics

HIPAA Security. 1 Security 101 for Covered Entities. Security Topics HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical

More information

Elements of a Swift (and Effective) Response to a HIPAA Security Breach

Elements of a Swift (and Effective) Response to a HIPAA Security Breach Elements of a Swift (and Effective) Response to a HIPAA Security Breach Susan E. Ziel, RN BSN MPH JD Krieg DeVault LLP Past President, The American Association of Nurse Attorneys Disclaimer The information

More information

HIPAA Omnibus Notice of Privacy Practices

HIPAA Omnibus Notice of Privacy Practices HIPAA Omnibus Notice of Privacy Practices Revised 2013 Urological Associates of Bridgeport, PC 160 Hawley Lane, Suite 002, Trumbull, CT 06611 Tel: 203-375-3456 Fax: 203-375-4456 Effective as of April/14/2003

More information

Auditing and Monitoring for HIPAA Compliance. HCCA COMPLIANCE INSTITUTE 2003 April, Presented by: Suzie Draper Sheryl Vacca, CHC

Auditing and Monitoring for HIPAA Compliance. HCCA COMPLIANCE INSTITUTE 2003 April, Presented by: Suzie Draper Sheryl Vacca, CHC Auditing and Monitoring for HIPAA Compliance HCCA COMPLIANCE INSTITUTE 2003 April, 2003 Presented by: Suzie Draper Sheryl Vacca, CHC 1 The Elements of Corporate Compliance Program There are seven key elements

More information

Data Backup and Contingency Planning Procedure

Data Backup and Contingency Planning Procedure HIPAA Security Procedure HIPAA made Easy Data Backup and Contingency Planning Procedure Please fill in date implemented and updates for your facility: Goal: This document will serve as our back-up storage

More information

Enterprise Income Verification (EIV) System User Access Authorization Form

Enterprise Income Verification (EIV) System User Access Authorization Form Enterprise Income Verification (EIV) System User Access Authorization Form Date of Request: (Please Print or Type) PART I. ACCESS AUTHORIZATION * All required information must be provided in order to be

More information

HIPAA/HITECH Privacy & Security Checklist Assessment HIPAA PRIVACY RULE

HIPAA/HITECH Privacy & Security Checklist Assessment HIPAA PRIVACY RULE 164.502 Develop "minimum necessary" policies for: HIPAA PRIVACY RULE 164.514 - Uses 15 Exempts disclosure for the purpose of treatment from the minimum necessary standard. Page references for - Routine

More information

Beam Technologies Inc. Privacy Policy

Beam Technologies Inc. Privacy Policy Beam Technologies Inc. Privacy Policy Introduction Beam Technologies Inc., Beam Dental Insurance Services LLC, Beam Insurance Administrators LLC, Beam Perks LLC, and Beam Insurance Services LLC, (collectively,

More information

3/24/2014. Agenda & Objectives. HIPAA Security Rule. Compliance Institute. Background and Regulatory Overlay. OCR Statistics/

3/24/2014. Agenda & Objectives. HIPAA Security Rule. Compliance Institute. Background and Regulatory Overlay. OCR Statistics/ Compliance Institute Session 501: Implementing a System-Wide Access Monitoring Program Brian D. Annulis Meade, Roach & Annulis, LLP Aegis Compliance & Ethics Center, LLP 4147 N. Ravenswood Avenue Suite

More information

Virtua Health, Inc. is a 501 (c) (3) non-profit corporation located in Marlton, New Jersey ( Virtua ).

Virtua Health, Inc. is a 501 (c) (3) non-profit corporation located in Marlton, New Jersey ( Virtua ). myvirtua.org Terms of Use PLEASE READ THESE TERMS OF USE CAREFULLY Virtua Health, Inc. is a 501 (c) (3) non-profit corporation located in Marlton, New Jersey ( Virtua ). Virtua has partnered with a company

More information

University of Mississippi Medical Center Data Use Agreement Protected Health Information

University of Mississippi Medical Center Data Use Agreement Protected Health Information Data Use Agreement Protected Health Information This Data Use Agreement ( DUA ) is effective on the day of, 20, ( Effective Date ) by and between (UMMC) ( Data Custodian ), and ( Recipient ), located at

More information

HIPAA Security Checklist

HIPAA Security Checklist HIPAA Security Checklist The following checklist summarizes the HIPAA Security Rule requirements that should be implemented by both covered entities and business associates. The citations are to 45 CFR

More information

HIPAA Security Checklist

HIPAA Security Checklist HIPAA Security Checklist The following checklist summarizes the HIPAA Security Rule requirements that should be implemented by both covered entities and business associates. The citations are to 45 CFR

More information

Secure Messaging Mobile App Privacy Policy. Privacy Policy Highlights

Secure Messaging Mobile App Privacy Policy. Privacy Policy Highlights Secure Messaging Mobile App Privacy Policy Privacy Policy Highlights For ease of review, Everbridge provides these Privacy Policy highlights, which cover certain aspects of our Privacy Policy. Please review

More information

MANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors

MANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors Page 1 of 6 Applies to: faculty staff students student employees visitors contractors Effective Date of This Revision: June 1, 2018 Contact for More Information: HIPAA Privacy Officer Board Policy Administrative

More information

HIPAA Faux Pas. Lauren Gluck Physician s Computer Company User s Conference 2016

HIPAA Faux Pas. Lauren Gluck Physician s Computer Company User s Conference 2016 HIPAA Faux Pas Lauren Gluck Physician s Computer Company User s Conference 2016 Goals of this course Overview of HIPAA and Protected Health Information Define HIPAA s Minimum Necessary Rule Properly de-identifying

More information

Data Processing Agreement

Data Processing Agreement In accordance with the European Parliament- and Council s Directive (EU) 2016/679 of 27th April 2016 (hereinafter GDPR) on the protection of physical persons in connection with the processing of personal

More information

Agenda. Hungry, Hungry HIPAA: Security, Enforcement, Audits, & More. Health Law Institute

Agenda. Hungry, Hungry HIPAA: Security, Enforcement, Audits, & More. Health Law Institute Health Law Institute Hungry, Hungry HIPAA: Security, Enforcement, Audits, & More Brooke Bennett Aziere October 18, 2017 Agenda Enforcement Trends Phase 2 HIPAA Audits Upcoming Initiatives 1 Enforcement

More information

SECURITY & PRIVACY DOCUMENTATION

SECURITY & PRIVACY DOCUMENTATION Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive

More information

How to Respond to a HIPAA Breach. Tuesday, Oct. 25, 2016

How to Respond to a HIPAA Breach. Tuesday, Oct. 25, 2016 How to Respond to a HIPAA Breach Tuesday, Oct. 25, 2016 This Webinar is Brought to You By. About HealthInsight and Mountain-Pacific Quality Health HealthInsight and Mountain-Pacific Quality Health are

More information

HIPAA Privacy, Security and Breach Notification 2018

HIPAA Privacy, Security and Breach Notification 2018 HIPAA Privacy, Security and Breach Notification 2018 An Eagle Associates Presentation Eagle Associates, Inc. www.eagleassociates.net info@eagleassociates.net P.O. Box 1356 Ann Arbor, MI 48106 800-777-2337

More information

2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY

2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY 2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY Purpose: The purpose of this policy is to provide instruction and information to staff, auditors, consultants, contractors and tenants on

More information

HIPAA Security Rule Policy Map

HIPAA Security Rule Policy Map Rule Policy Map Document Information Identifier Status Published Published 02/15/2008 Last Reviewed 02/15/1008 Last Updated 02/15/2008 Version 1.0 Revision History Version Published Author Description

More information

Privacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information

Privacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information Privacy Statement Introduction Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information about how IT Support (UK) Ltd handle personal information.

More information

IT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I

IT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I Standards Sections Checklist Section Security Management Process 164.308(a)(1) Information Security Program Risk Analysis (R) Assigned Security Responsibility 164.308(a)(2) Information Security Program

More information

8 COMMON HIPAA COMPLIANCE ERRORS TO AVOID

8 COMMON HIPAA COMPLIANCE ERRORS TO AVOID Billing & Reimbursement Revenue Cycle Management 8 COMMON HIPAA COMPLIANCE ERRORS TO AVOID Billing and Reimbursement for Physician Offices, Ambulatory Surgery Centers and Hospitals Billings & Reimbursements

More information

HIPAA Privacy, Security and Breach Notification 2017

HIPAA Privacy, Security and Breach Notification 2017 HIPAA Privacy, Security and Breach Notification 2017 An Eagle Associates Presentation Eagle Associates, Inc. www.eagleassociates.net info@eagleassociates.net P.O. Box 1356 Ann Arbor, MI 48106 800-777-2337

More information

HIPAA Cloud Computing Guidance

HIPAA Cloud Computing Guidance HIPAA Cloud Computing Guidance Adam Greene, JD, MPH Partner Rebecca Williams, BSN, JD Partner Nature is a mutable cloud which is always and never the same Ralph Waldo Emerson 2 Agenda A few historical

More information

Terms used, but not otherwise defined, in this Agreement shall have the same meaning as those terms in the HIPAA Privacy Rule.

Terms used, but not otherwise defined, in this Agreement shall have the same meaning as those terms in the HIPAA Privacy Rule. Medical Privacy Version 2018.03.26 Business Associate Agreement This Business Associate Agreement (the Agreement ) shall apply to the extent that the Lux Scientiae HIPAA Customer signee is a Covered Entity

More information

Regulation P & GLBA Training

Regulation P & GLBA Training Regulation P & GLBA Training Overview Regulation P governs the treatment of nonpublic personal information about consumers by the financial institution. (Gramm-Leach-Bliley Act of 1999) The GLBA is composed

More information

Incident Response: Are You Ready?

Incident Response: Are You Ready? Incident Response: Are You Ready? Chris Apgar, CISSP Apgar & Associates, LLC 2014 Security Incident vs. Breach Overview Security Incident Planning and Your Team Final Breach Notification Rule a refresher

More information

(c) Apgar & Associates, LLC

(c) Apgar & Associates, LLC Incident Response: Are You Ready? Chris Apgar, CISSP Apgar & Associates, LLC 2014 Security Incident vs. Breach Overview Security Incident Planning and Your Team Final Breach Notification Rule a refresher

More information

Audits Accounting of disclosures

Audits Accounting of disclosures Once more unto the breach Mastering HIPAA s data breach notification requirements September 20, 2011 Presented by: Kathy Kenady Senior Loss Prevention Representative Medical Insurance Exchange of California

More information

Fritztile is a brand of The Stonhard Group THE STONHARD GROUP Privacy Notice The Stonhard Group" Notice Whose Personal Data do we collect?

Fritztile is a brand of The Stonhard Group THE STONHARD GROUP Privacy Notice The Stonhard Group Notice Whose Personal Data do we collect? Fritztile is a brand of The Stonhard Group THE STONHARD GROUP Privacy Notice For the purposes of applicable data protection and privacy laws, The Stonhard Group, a division of Stoncor Group, Inc. ( The

More information

RelayHealth Legal Notices

RelayHealth Legal Notices Page 1 of 7 RelayHealth Legal Notices PRIVACY POLICY Revised August 2010 This policy only applies to those RelayHealth services for which you also must accept RelayHealth s Terms of Use. RelayHealth respects

More information

HIPAA Security Manual

HIPAA Security Manual 2010 HIPAA Security Manual Revised with HITECH ACT Amendments Authored by J. Kevin West, Esq. 2010 HALL, FARLEY, OBERRECHT & BLANTON, P.A. DISCLAIMER This Manual is designed to set forth general policies

More information

HIPAA 101: What All Doctors NEED To Know

HIPAA 101: What All Doctors NEED To Know HIPAA 101: What All Doctors NEED To Know 1 HIPAA Basics HIPAA: Health Insurance and Portability Accountability Act of 1996 Purpose: to protect confidential information through improved security and privacy

More information

HIPAA Compliance Checklist

HIPAA Compliance Checklist HIPAA Compliance Checklist Hospitals, clinics, and any other health care providers that manage private health information today must adhere to strict policies for ensuring that data is secure at all times.

More information

USER CORPORATE RULES. These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy.

USER CORPORATE RULES. These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy. These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy. I. OBJECTIVE ebay s goal is to apply uniform, adequate and global data protection

More information

New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines

New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines New York Department of Financial Services ( DFS ) Regulation 23 NYCRR 500 requires that entities

More information

Securing IT Infrastructure Improve information exchange and comply with HIPAA, HITECH, and ACA mandates

Securing IT Infrastructure Improve information exchange and comply with HIPAA, HITECH, and ACA mandates Securing IT Infrastructure Improve information exchange and comply with HIPAA, HITECH, and ACA mandates Ruby Raley, Director Healthcare Solutions Axway Agenda Topics: Using risk assessments to improve

More information

RETINAL CONSULTANTS OF ARIZONA, LTD. HIPAA NOTICE OF PRIVACY PRACTICES. Our Responsibilities. Our Uses and Disclosures

RETINAL CONSULTANTS OF ARIZONA, LTD. HIPAA NOTICE OF PRIVACY PRACTICES. Our Responsibilities. Our Uses and Disclosures RETINAL CONSULTANTS OF ARIZONA, LTD. HIPAA NOTICE OF PRIVACY PRACTICES This notice describes how health information about you may be used and disclosed and how you can get access to this information. Please

More information

Update on Administration and Enforcement of the HIPAA Privacy, Security, and Breach Notification Rules

Update on Administration and Enforcement of the HIPAA Privacy, Security, and Breach Notification Rules Update on Administration and Enforcement of the HIPAA Privacy, Security, and Breach Notification Rules Wandah Hardy, RN BSN, MPA Equal Opportunity Specialist/Investigator Office for Civil Rights (OCR)

More information

HIPAA COMPLIANCE AND

HIPAA COMPLIANCE AND INTRONIS MSP SOLUTIONS BY BARRACUDA HIPAA COMPLIANCE AND DATA PROTECTION CONTENTS Introduction... 3 The HIPAA Security Rule... 4 The HIPAA Omnibus Rule... 6 HIPAA Compliance and Intronis Cloud Backup and

More information

U.S. Department of Health and Human Services (HHS) The Office of the National Coordinator for Health Information Technology (ONC)

U.S. Department of Health and Human Services (HHS) The Office of the National Coordinator for Health Information Technology (ONC) U.S. Department of Health and Human Services (HHS) The Office of the National Coordinator for Health Information Technology (ONC) Security Risk Assessment Tool Physical Safeguards Content Version Date:

More information