Revised January

Size: px
Start display at page:

Download "Revised January"

Transcription

1 Revised January

2 Copyright and Trade Secret Warning All Rights Reserved. This training presentation contains confidential and proprietary trade secrets of and copyrights belonging to RadNet Management, Inc., its subsidiaries, and/or affiliates (collectively, "RadNet"). This training i presentation ti may only be used by a RadNet Center, RadNet's representatives or upon the express written permission of RadNet, and may not be reproduced in any media, either in whole or in part. Any reproduction of these documents, in whole or in part, or any use of these documents, other than as directed or agreed upon in writing by RadNet, is strictly tl prohibited and constitutes t a violation of law. 2

3 If you have questions as you review this training module, please talk to your facility manager or their designated d representative. If you need further assistance, please contact t your Regional Quality Assurance Specialist. West Coast: Carol Meena East Coast: April Dickerson

4 HIPAA is the acronym for the Health Insurance Portability and Accountability Act that was passed by Congress in The HIPAA Privacy Rule regulates the use and disclosure (sharing) of protected health information (PHI) and electronic protected health information (ephi). The regulations are designed to protect the privacy of each patient s medical records and thereby reduce instances of medical identity theft. 4

5 HITECH is the acronym for the Health Information Technology for Economic and Clinical Health Act. HITECH was enacted by Congress as part of the American Recovery and Reinvestment Act of 2009 to promote the adoption and meaningful use of health information technology. The government firmly believes in the benefits of using electronic health records and has invested federal resources to proliferate the use of electronic health records (EHR). 5

6 Our Business Associates are people or companies that perform certain functions for RadNet that involve the intentional sharing (disclosure) of protected health information (PHI) in order to conduct business with each other. Examples of Business Associates include, but are not limited to, transcription companies, billing companies, insurance companies, collection agencies, software companies, etc. We must have Business Associate Agreements (confidentiality agreements) in place to protect the patient information we share. 6

7 As an employee of RadNet, you are required to sign an Employee Confidentiality Agreement stating that you understand it is your responsibility to keep the PHI of each patient secure and confidential at all times from unauthorized or inadvertent access and from corruption or destruction by an unauthorized person. A Vendor Confidentiality Agreement is used for vendors who come on-site or access RadNet information. It states that the vendor understands the information they may see is highly confidential and cannot be further disclosed. A Non-Disclosure Agreement is required whenever providing any proprietary business information to an external organization that might engage RadNet for services or information. For example: to scope a project, for evidence that policies and procedures are in place, or as part of due diligence efforts. 7

8 The Privacy Rule describes how we can Use and Disclose protected health information (PHI). Use is when we share patient information within RadNet. Disclosure is when we share patient information to a person or company outside of RadNet. There are very specific rules about the Use and Disclosure of PHI of PHI. 8

9 RadNet and our affiliated healthcare businesses are covered by the HIPAA and HITECH laws and standards. Individual employees, as well as the Company, can be held accountable for HIPAA or HITECH violations. 9

10 Healthcare organizations must have in place and apply appropriate sanctions against employees who fail to comply with privacy policies and procedures. The organization may not take action against a patient for exercising his or her privacy rights. 10

11 Employees who violate RadNet policies regarding the privacy and security of confidential, restricted, or protected health information are subject to corrective and disciplinary actions according to existing policies. Actions taken could include: Termination of employment. Possible further legal l action. Violation of local, State and Federal laws may carry additional consequences of prosecution under the law, costs of litigation, payment of damages, or all. Knowing, malicious intent = Penalties, fines, jail! 11

12 The term breach means the unauthorized acquisition, access, use, or disclosure of protected health information which compromises the security or privacy of such information. A breach may either be intentional or accidental. Either way, we must take action to correct the breach. Such actions are explained later in this training. 12

13 Stolen/lost computer, flash drive or other electronic media containing unsecured PHI. Lost papers or films containing i PHI. Misdirected or patient record. Explanation of Benefits sent to wrong guarantor. Misfiled patient information in another patient s record which is brought to our attention by the patient. Medical records lost in the mail and never received. Misdirected fax. Employee accesses records of a celebrity, relative, friend or coworker out of curiosity without a necessary business related purpose (snooping). 13

14 RadNet employees may access patient information for authorized business purposes only. Accessing information for any reason that is not an authorized and necessary business purpose is considered snooping. Snooping is considered a breach and a criminal offense and is punishable by law. RadNet takes snooping VERY SERIOUSLY. 14

15 Penalties can be assessed against the Company. Penalties can also be assessed against an individual id employee for causing the breach. For your own protection ti and to avoid sanctions and penalties, every employee is urged to be very careful when handling PHI. Be careful with papers, films, CDs, faxes, s, electronic information, and even your conversations involving protected health information. 15

16 Penalties are based on the organization s responsibility for the HIPAA violation and are determined by the nature and extent t of both the violation and the harm caused by it. Violation Amount per Violation Repeat Violation in Same Year Did Not Know $100 - $50,000 $1,500,000 Reasonable Cause $1,000 - $50,000 $1,500,000 Willful Neglect Corrected Willful Neglect Not Corrected $10,000 - $50,000 $1,500,000 $50,000 $1,500,000 16

17 How RadNet Protects PHI RadNet continuously reviews and updates electronic security measures to help protect PHI. IT policies and procedures can be reviewed in the RadNet HIPAA/HITECH Information Security Policy & Procedure Manual. HIPAA policies can also be reviewed in the RadNet Corporate Compliance Manual. 17

18 1. User ID: Use only unique usernames (not a shared account) 2. Passwords: Don t share passwords, access codes, proxycards. Change passwords at least every 90 days. Create strong passwords or passphrases. 3. Workstation Security: Log off or lock <ctr-alt-del> when you leave. 4. Portable Device Security: Lock it up and use encryption. 5. Data Management: Save critical or sensitive data only on network drives. 6. Remote Access: Use a Virtual Private Network. 7. Recycle Electronic Media & Computers: Reformat or remove/destroy hard drives and media. 8. and File Sharing: Encrypt all PHI sent via e- mail. Don t share PHI on cloud storage. 9. Safe Internet Use: Report unfiltered Internet access. 10.Physical Access: Don t give unauthorized access to secure areas. 11.Report Security Incidents: All potential issues reported to security@radnet.com. 18

19 Control Access: Do not share your unique User Name/ User ID or application access. Only access the minimum information needed to do your job. Remember that user access to information systems is logged and audited for inappropriate access or use. 19

20 Protect your Password: Never share your password protect it the same as you would the key to your residence. After all, it is a key to your identity. Log out when you are done so others do not access information under your name and password. If they access inappropriate information, you will be identified as the user. Never set a web browser to remember your password. Public or shared computers allow others access to your password. 20

21 Workstations include any electronic computing device such as a laptop or desktop computer. Portable devices, including tablets and smart phones that have similar computing functionality, must also adhere to RadNet s security standards. Physical Security Measures include: Disaster Recovery Controls Physical Access Controls Device & Media Controls 21

22 Administrative, technical and physical safeguards for PHI: Requires entities to secure the confidentiality, integrity and availability of any PHI they create, receive, maintain or transmit. Supports the Privacy Rule s mandates for proper use and disclosure of PHI. Requires entities to identify and protect against anticipated threats and ensure workforce compliance threats and ensure workforce compliance. Includes 22 standards and 50 implementation specifications. 22

23 Administrative Safeguards: Follow our Compliance and IT Department t policies i and procedures for handling PHI. Physical Safeguards: Secure workstations, portable devices and electronic media with passwords and locks. Ensure secure transfer, removal, disposal and re-use of devices and files that contain PHI. Technical Safeguards: Encrypt PHI before transmitting and storing it. Follow required audit controls. Comply with policies for accessing, altering and destroying PHI. 23

24 Charts Databases Desktop/Laptop Backup Drives and files Computers and Discs Conversations Imaging Equipment Flash Drives Tablets & Phones 24

25 All portable devices (laptops, tablets, cell phones, flash drives, memory cards, etc.) must be stored in a secure location. They must be password protected and encrypted if they contain highly sensitive or confidential data. Never affix your User ID or Password to the device. Never leave a portable device unattended or unsecured and safeguard them when you transport them. If your portable device is lost or stolen, report it immediately to the Compliance and Quality Assurance Department. 25

26 1. Lax Information Security Files left open for others to see. Shared passwords. Inappropriate use of portable media devices. Lost or stolen patient files, hard drives, computers. Hacking of systems from external threats. 26

27 2. Insider Threats Employees, competitors or vendors who seek to obtain PHI for selfish reasons, such as: Commercial advantage Personal gain Malicious harm 27

28 3. Social Engineering Traps Phishing and other electronic attacks that trick people into revealing PHI. Individuals who pose as an authorized source in order to trick people into disclosing PHI. A scammer who pretends to be an insurance representative over the phone. A criminal posting as a vendor during an on-site visit. Hacking of systems from outside threats. 28

29 29

30 All breaches of patient information must be reported and investigated by the facility manager to determine What was breached; Who it was breached to; and How it was breached. The breach notification final rule requires us to determine the risk of compromise to a patient rather than potential harm to a patient when their information is breached. Actions must be taken to resolve the breach, such as getting g the breached information back or making sure it has been permanently destroyed. 30

31 To determine whether there is a low probability that PHI has been compromised, we must conduct a risk assessment that considers at least each of the following factors: The nature and extent of the PHI involved, including the types of identifiers and the likelihood of re- identification. The unauthorized person who used or received the PHI. Whether the PHI was physically acquired or just viewed. The extent to which the risk to the PHI has been mitigated (did we get it back or was it permanently destroyed). d) 31

32 Healthcare providers still have a safe harbor, in which an unauthorized disclosure only rises to the level of a breach thereby triggering notification requirements if the PHI disclosed is "unsecured. Unsecured PHI is PHI that is not rendered unusable, unreadable or indecipherable to unauthorized individuals through the use of technology or methodology specified by the secretary through published guidance. In other words, if it s encrypted and the person can t view it, it s not a breach. 32

33 33

34 ALL Breaches shall be reported to the QA Department immediately upon discovery. Document whose information was breached. Document who the information was breached to. Include copies of exactly what was breached when you submit the report (except films or image CDs). The QA Department will assist facility managers when patient notification is required. Do not notify the patient unless the QA Dept directs you to do so. 34

35 Breach incidents are reported online at Login to QA Tracker Incident Reporting Click on Create Breach Incident Report Detailed instructions are available in RadNet s Incident Report Training 35

36 Healthcare providers must sometimes provide notice to: Individuals; The media (if the breach affects more than 500 residents of a state or smaller jurisdiction); and The Department of Health and Human Services HHS (if the breach affects more than 500 individuals, regardless of location). Business associates must also provide notice no later than 60 days after the discovery of a breach of unsecured PHI. Do not provide Notice unless you are advised to do so by the Quality Assurance Department. 36

37 Sometimes the patient will file a complaint with the Board of Physicians, Office of Inspector General or other government agency. Notify your manager and the Quality Assurance Department right away if you receive notice of a breach complaint from an agency. We are typically required to provide a written response to these types of breach investigations. There is usually a specified time frame, so report this right away. The QA Dept. will assist in preparing these responses. 37

38 Once a breach is investigated to determine who was breached, who received the breached information, exactly what was breached, and how it was breached, it is important to implement a corrective action plan. Corrective action includes: Contact the person who received the breach and either collect the information back or have the person sign an Attestation of Destruction verifying the information was permanently destroyed by cross-shredding. Counsel the employee who caused the breach and provide training on their error. Document all of this in the online Breach Report. 38

39 39

40 Employees must be extremely careful when releasing medical records. Careless mistakes are not acceptable. There is no excuse for providing the wrong medical records to a patient or a provider. 40

41 Ensure the intended recipient is actually entitled to receive the medical records that were requested. Obtain a properly documented Medical Records Release Form NOTE: We are required by law to keep a record of all disclosures of patient information. 41

42 42

43 Ensure the intended recipient is actually entitled to receive the medical records that were requested. Obtain a properly documented Medical Records Release Form We are required by law to keep a record of all disclosures of patient information. The patient must provide written permission to mail medical records to an authorized representative. 43

44 Check photo ID We must be sure we are dealing with the patient t or their authorized representative ti They can fax or it to you. If you obtain the Release Form via or fax, check the signature against photo ID or previously archived RIS documents We must be sure the actual patient authorized the mailing of their records. If you engage in correspondence to collect this document, follow the Correspondence With Patients Policy. 44

45 Carefully check the name and address of the intended recipient i on the envelope. Many names are similar; Make sure you have the correct name for the intended d recipient i on the envelope. Make sure the address on the envelope matches the correct address of the intended recipient. 45

46 Double check the contents of the envelope before sealing it. Make sure the contents belong to the intended recipient. Check all pages to make sure records of another patient t are not mistakenly included in the envelope. Especially check billing invoices i to ensure only one patient t is included on the invoice. 46

47 Check what shows through the envelope window if using this type of envelope. Make sure protected health information (besides the patient s t name and address) ) is not showing through the view window. 47

48 When doing mass mailings, do a small test run to ensure the system is performing properly. Always check a sample of the mailings for the accuracy of name and address and the correct contents t before sending the batch. 48

49 49

50 Confirm the fax number if it is one that is not regularly used or is not programmed into the RIS. Carefully check the fax number to ensure it is correct for the intended recipient. When manually entering the number, check to see that it has been entered correctly before hitting Send. When faxing directly to a patient do not hesitate to call the patient to confirm they requested the fax Someone else could be acting as the patient and making this request. 50

51 Program regularly used fax numbers into the RIS or into the manual fax machine. Check to make sure you selected the correct preprogrammed number before sending. Update a preprogrammed fax number as soon as you receive notification that it has changed. Update a preprogrammed fax number as soon as you receive notice that it is incorrect. Delete a preprogrammed fax number if it is no longer being used. 51

52 Fax through the RIS whenever possible. If you have a manual fax machine, place it in a location where it can be visually monitored and controlled. Avoid leaving patient information on fax machines after sending documents. Pick up received faxes as soon as possible. 52

53 53

54 Carefully check the name of the intended recipient on the envelope. Many names are similar; Make sure you have the correct name for the intended recipient on the envelope. 54

55 Double check the contents of the envelope before handing it over to the recipient Even if you prepared p the envelope yourself, check it again before handing it over. Make sure the contents belong to the intended recipient. Check all pages to make sure records of another patient are not mistakenly included in the envelope. Especially check billing invoices to ensure only one patient is included on the invoice. 55

56 56

57 Every employee is responsible for how they handle patient information. There are often multiple employees involved in preparing and releasing a package of medical information. Each person in the chain is responsible for double checking the information in and on the package is correct. 57

58 We cannot state this loud enough Take that extra moment to double check. Mail envelopes Faxes Pick-up envelopes Double check every single time. It only takes a moment to avoid costly mistakes. 58

59 59

60 The parents or legal guardians of a minor patient under the age of eighteen (18) years old are generally considered the personal representatives of the minor. All patients age 18 and over are considered adults. As such, the parent or legal guardian has no rights of access to the patient s medical records or other PHI, including, but not limited to, appointment information, exam results, copies of images, and billing invoices. These patients must provide authorization for their parent to have access to their medical records and appointment information. 60

61 An emancipated minor is one whose personal situation allows us to interact with the minor as though the minor was an adult. A person under the age of 18 lacks the legal capacity to give consent for medical treatment except under the circumstances cited below: Married Minor Minor Emancipated by Court Order Self-Sufficient Minor Minor on Active Duty Pregnant Minor Minor with an Infectious Disease Rape Victims and Victims of Sexual Assault Minor with Drug or Alcohol Related Problems 61

62 Procedure for handling minors (who are not emancipated): Present all exam-related paperwork to the parent or legal guardian of minor patients under the age of 18. A minor s parent or guardian may sign a statement to authorize a third party to consent to a minor s medical care in the parent s absence. 62

63 If an unaccompanied minor arrives for an appointment without a signed statement authorizing a third party to consent to the minor s medical care in the parent s absence: Determine whether the unaccompanied minor is emancipated before contacting the minor s parent or legal guardian. Refer to the state specific listing of emancipation conditions found in RadNet s Minor Patients Policy in the Front Office / Billing Policy Manual. Contact the unaccompanied minor s parent or legal guardian to obtain permission to treat the minor patient. Note the conversation in the patient s medical record by documenting the following: Names of both parties to the call, including the employee s title. Authority of the person giving the verbal consent to treat the minor. Date and time of the call. Specific information relayed. 63

64 The Privacy Rule generally allows a parent to have access to the medical records of his or her child. There are three situations when the parent would not be the minor s personal representative under the Privacy Rule. These exceptions are: When the minor is the one who consents to care, and the consent of the parent is not required under State or other applicable law; When the minor obtains care at the direction of a court or a person appointed by the court; and When, and to the extent that, the parent agrees that the minor and the healthcare provider may have a confidential relationship. 64

65 However, even in these exceptional situations, the parent may have access to the medical records of the minor related to this treatment when State or other applicable law requires or permits such parental access. Parental access would be denied when State or other law prohibits such access. If fs State or other applicable law is silent on a parent s right of access in these cases, the licensed healthcare provider may exercise his or her professional judgment to the extent allowed by law to grant or deny parental access to the minor s medical information. 65

66 A provider may choose not to treat a parent as a personal representative ti if the provider reasonably believes, in his or her professional judgment, that the child has been or may be subjected to domestic violence, abuse or neglect, or that treating the parent as the child s personal representative could endanger the child. For a complete list of fstate specific conditions for which a minor can consent to treatment, refer to the Minor Patients Policy in the RadNet Front Office / Billing Policy and Procedure Manual. 66

67 Complete the corresponding quiz in Online Academy. Remember to speak with your supervisor if you have any questions about the information presented in this training. 67

HIPAA FOR BROKERS. revised 10/17

HIPAA FOR BROKERS. revised 10/17 HIPAA FOR BROKERS revised 10/17 COURSE PURPOSE The purpose of this information is to help ensure that all Optima Health Brokers are prepared to protect the privacy and security of our members health information.

More information

Federal Breach Notification Decision Tree and Tools

Federal Breach Notification Decision Tree and Tools Federal Breach Notification and Tools Disclaimer This document is copyright 2009 by the Long Term Care Consortium (LTCC). These materials may be reproduced and used only by long-term health care providers

More information

HIPAA Privacy & Security Training. Privacy and Security of Protected Health Information

HIPAA Privacy & Security Training. Privacy and Security of Protected Health Information HIPAA Privacy & Security Training Privacy and Security of Protected Health Information Course Competencies: This training module addresses the essential elements of maintaining the HIPAA Privacy and Security

More information

Putting It All Together:

Putting It All Together: Putting It All Together: The Interplay of Privacy & Security Regina Verde, MS, MBA, CHC Chief Corporate Compliance & Privacy Officer University of Virginia Health System 2017 ISPRO Conference October 24,

More information

HIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012

HIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012 HIPAA Privacy and Security Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012 Goals and Objectives Course Goal: Can serve as annual HIPAA training for physician practice

More information

HIPAA How to Comply with Limited Time & Resources. Jonathan Pantenburg, MHA, Senior Consultant August 17, 2017

HIPAA How to Comply with Limited Time & Resources. Jonathan Pantenburg, MHA, Senior Consultant August 17, 2017 HIPAA How to Comply with Limited Time & Resources Jonathan Pantenburg, MHA, Senior Consultant JPantenburg@Stroudwater.com August 17, 2017 Stroudwater Associates is a leading national healthcare consulting

More information

HIPAA in 2017: Hot Topics You Can t Ignore. Danika Brinda, PhD, RHIA, CHPS, HCISPP March 16, 2017

HIPAA in 2017: Hot Topics You Can t Ignore. Danika Brinda, PhD, RHIA, CHPS, HCISPP March 16, 2017 HIPAA in 2017: Hot Topics You Can t Ignore Danika Brinda, PhD, RHIA, CHPS, HCISPP March 16, 2017 Breach Notification State Law Privacy Rule Authorizations Polices and Procedures The Truth Is Have created

More information

Security and Privacy Breach Notification

Security and Privacy Breach Notification Security and Privacy Breach Notification Version Approval Date Owner 1.1 May 17, 2017 Privacy Officer 1. Purpose To ensure that the HealthShare Exchange of Southeastern Pennsylvania, Inc. (HSX) maintains

More information

HIPAA Federal Security Rule H I P A A

HIPAA Federal Security Rule H I P A A H I P A A HIPAA Federal Security Rule nsurance ortability ccountability ct of 1996 HIPAA Introduction - What is HIPAA? HIPAA = The Health Insurance Portability and Accountability Act A Federal Law Created

More information

HIPAA Faux Pas. Lauren Gluck Physician s Computer Company User s Conference 2016

HIPAA Faux Pas. Lauren Gluck Physician s Computer Company User s Conference 2016 HIPAA Faux Pas Lauren Gluck Physician s Computer Company User s Conference 2016 Goals of this course Overview of HIPAA and Protected Health Information Define HIPAA s Minimum Necessary Rule Properly de-identifying

More information

HIPAA UPDATE. Michael L. Brody, DPM

HIPAA UPDATE. Michael L. Brody, DPM HIPAA UPDATE Michael L. Brody, DPM Objectives: How to respond to a patient s request for a copy of their records. Understand your responsibilities after you send information out to another doctor, hospital

More information

HIPAA Privacy & Security Training. HIPAA The Health Insurance Portability and Accountability Act of 1996

HIPAA Privacy & Security Training. HIPAA The Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy & Security Training HIPAA The Health Insurance Portability and Accountability Act of 1996 AMTA confidentiality requirements AMTA Professional Competencies 20. Documentation 20.7 Demonstrate

More information

HIPAA Security and Privacy Policies & Procedures

HIPAA Security and Privacy Policies & Procedures Component of HIPAA Security Policy and Procedures Templates (Updated for HITECH) Total Cost: $495 Our HIPAA Security policy and procedures template suite have 71 policies and will save you at least 400

More information

Policy and Procedure: SDM Guidance for HIPAA Business Associates

Policy and Procedure: SDM Guidance for HIPAA Business Associates Policy and Procedure: SDM Guidance for HIPAA Business (Adapted from UPMC s Guidance for Business at http://www.upmc.com/aboutupmc/supplychainmanagement/documents/guidanceforbusinessassociates.pdf) Effective:

More information

A Panel Discussion. Nancy Davis

A Panel Discussion. Nancy Davis A Panel Discussion 1 Nancy Davis Director of Compliance & Safety, Door County Medical Center Cathy Hansen Director, Health Information Services & Privacy Officer, St. Croix Regional Medical Center Rhonda

More information

Employee Security Awareness Training Program

Employee Security Awareness Training Program Employee Security Awareness Training Program Date: September 15, 2015 Version: 2015 1. Scope This Employee Security Awareness Training Program is designed to educate any InComm employee, independent contractor,

More information

Sample BYOD Policy. Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited.

Sample BYOD Policy. Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited. Sample BYOD Policy Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited. SAMPLE BRING YOUR OWN DEVICE POLICY TERMS OF USE This Sample Bring

More information

QUALITY HIPAA December 23, 2013

QUALITY HIPAA December 23, 2013 December 23, 2013 Page 1 of 5 Breach, HIPAA and Protected Health Information This week, we look at the rules governing HIPAA, the HITECH Act and HIPAA Omnibus Rule. Unsecured PHI means Protected Health

More information

How to Respond to a HIPAA Breach. Tuesday, Oct. 25, 2016

How to Respond to a HIPAA Breach. Tuesday, Oct. 25, 2016 How to Respond to a HIPAA Breach Tuesday, Oct. 25, 2016 This Webinar is Brought to You By. About HealthInsight and Mountain-Pacific Quality Health HealthInsight and Mountain-Pacific Quality Health are

More information

HIPAA Privacy and Security Training Program

HIPAA Privacy and Security Training Program Note The following HIPAA training is intended for Vendors, Business Associates, Students, Pre Approved Shadowers, and Visitors. The following training module does not provide credit for annual training

More information

HIPAA COMPLIANCE AND DATA PROTECTION Page 1

HIPAA COMPLIANCE AND DATA PROTECTION Page 1 HIPAA COMPLIANCE AND DATA PROTECTION info@resultstechnology.com 877.435.8877 Page 1 CONTENTS Introduction..... 3 The HIPAA Security Rule... 4 The HIPAA Omnibus Rule... 6 HIPAA Compliance and RESULTS Cloud

More information

HIPAA-HITECH: Privacy & Security Updates for 2015

HIPAA-HITECH: Privacy & Security Updates for 2015 South Atlantic Regional Annual Conference Orlando, FL February 6, 2015 1 HIPAA-HITECH: Privacy & Security Updates for 2015 Darrell W. Contreras, Esq., LHRM Gregory V. Kerr, CHPC, CHC Agenda 2 OCR On-Site

More information

Information Privacy and Security Training 2016 for Instructors and Students. Authored by: Office of HIPAA Administration

Information Privacy and Security Training 2016 for Instructors and Students. Authored by: Office of HIPAA Administration Information Privacy and Security Training 2016 for Instructors and Students Authored by: Office of HIPAA Administration Objectives After you finish this Computer-Based Learning (CBL) module, you should

More information

HMIS (HOMELESS MANAGEMENT INFORMATION SYSTEM) SECURITY AWARENESS TRAINING. Created By:

HMIS (HOMELESS MANAGEMENT INFORMATION SYSTEM) SECURITY AWARENESS TRAINING. Created By: HMIS (HOMELESS MANAGEMENT INFORMATION SYSTEM) SECURITY AWARENESS TRAINING Created By: Overview The purpose of this presentation is to emphasize the importance of security when using HMIS. Client information

More information

Update on HIPAA Administration and Enforcement. Marissa Gordon-Nguyen, JD, MPH October 7, 2016

Update on HIPAA Administration and Enforcement. Marissa Gordon-Nguyen, JD, MPH October 7, 2016 Update on HIPAA Administration and Enforcement Marissa Gordon-Nguyen, JD, MPH October 7, 2016 Updates Policy Development Breaches Enforcement Audit 2 POLICY DEVELOPMENT RECENTLY PUBLISHED: RIGHT OF ACCESS,

More information

HIPAA Security Manual

HIPAA Security Manual 2010 HIPAA Security Manual Revised with HITECH ACT Amendments Authored by J. Kevin West, Esq. 2010 HALL, FARLEY, OBERRECHT & BLANTON, P.A. DISCLAIMER This Manual is designed to set forth general policies

More information

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers All Affiliate Research Policy Subject: HIPAA File Under: For Researchers ORA HIPAA Issuing Department: Office of Research Administration Original Policy Date Page 1 of 5 Approved by: May 9,2005 Revision

More information

Lesson Three: False Claims Act and Health Insurance Portability and Accountability Act (HIPAA)

Lesson Three: False Claims Act and Health Insurance Portability and Accountability Act (HIPAA) Lesson Three: False Claims Act and Health Insurance Portability and Accountability Act (HIPAA) Introduction: Welcome to Honesty and Confidentiality Lesson Three: The False Claims Act is an important part

More information

Secure Messaging Mobile App Privacy Policy. Privacy Policy Highlights

Secure Messaging Mobile App Privacy Policy. Privacy Policy Highlights Secure Messaging Mobile App Privacy Policy Privacy Policy Highlights For ease of review, Everbridge provides these Privacy Policy highlights, which cover certain aspects of our Privacy Policy. Please review

More information

Elements of a Swift (and Effective) Response to a HIPAA Security Breach

Elements of a Swift (and Effective) Response to a HIPAA Security Breach Elements of a Swift (and Effective) Response to a HIPAA Security Breach Susan E. Ziel, RN BSN MPH JD Krieg DeVault LLP Past President, The American Association of Nurse Attorneys Disclaimer The information

More information

HIPAA Compliance Checklist

HIPAA Compliance Checklist HIPAA Compliance Checklist Hospitals, clinics, and any other health care providers that manage private health information today must adhere to strict policies for ensuring that data is secure at all times.

More information

How Secure Do You Feel About Your HIPAA Compliance Plan? Daniel F. Shay, Esq.

How Secure Do You Feel About Your HIPAA Compliance Plan? Daniel F. Shay, Esq. How Secure Do You Feel About Your HIPAA Compliance Plan? Daniel F. Shay, Esq. Word Count: 2,268 Physician practices have lived with the reality of HIPAA for over twenty years. In that time, it has likely

More information

Red Flags/Identity Theft Prevention Policy: Purpose

Red Flags/Identity Theft Prevention Policy: Purpose Red Flags/Identity Theft Prevention Policy: 200.3 Purpose Employees and students depend on Morehouse College ( Morehouse ) to properly protect their personal non-public information, which is gathered and

More information

HIPAA and HIPAA Compliance with PHI/PII in Research

HIPAA and HIPAA Compliance with PHI/PII in Research HIPAA and HIPAA Compliance with PHI/PII in Research HIPAA Compliance Federal Regulations-Enforced by Office of Civil Rights State Regulations-Texas Administrative Codes Institutional Policies-UTHSA HOPs/IRB

More information

by Robert Hudock and Patricia Wagner April 2009 Introduction

by Robert Hudock and Patricia Wagner April 2009 Introduction HITECH Updates: Proposed Health Breach Notification Rule Promulgated by the FTC; HHS Releases Guidance on How to Render PHI Unusable, Unreadable, or Indecipherable by Robert Hudock and Patricia Wagner

More information

WASHINGTON UNIVERSITY HIPAA Privacy Policy # 7. Appropriate Methods of Communicating Protected Health Information

WASHINGTON UNIVERSITY HIPAA Privacy Policy # 7. Appropriate Methods of Communicating Protected Health Information WASHINGTON UNIVERSITY HIPAA Privacy Policy # 7 Appropriate Methods of Communicating Protected Health Information Statement of Policy Washington University and its member organizations (collectively, Washington

More information

HIPAA. Developed by The University of Texas at Dallas Callier Center for Communication Disorders

HIPAA. Developed by The University of Texas at Dallas Callier Center for Communication Disorders HIPAA Developed by The University of Texas at Dallas Callier Center for Communication Disorders Purpose of this training Everyone with access to Protected Health Information (PHI) must comply with HIPAA

More information

Information Privacy and Security Training Authored by: Office of HIPAA Administration

Information Privacy and Security Training Authored by: Office of HIPAA Administration Information Privacy and Security Training 2018 Authored by: Office of HIPAA Administration Objectives After you finish this Computer-Based Learning (CBL) module, you should be able to: Define privacy practices

More information

Compliance & HIPAA Annual Education

Compliance & HIPAA Annual Education Compliance & HIPAA Annual Education 1 The purpose of this education is to UPDATE The purpose and of this education REFRESH is to UPDATE your and REFRESH understanding understanding of: of: Aultman s Compliance

More information

The Relationship Between HIPAA Compliance and Business Associates

The Relationship Between HIPAA Compliance and Business Associates The Relationship Between HIPAA Compliance and Business Associates 1 HHS Wall of Shame 20% Involved Business Associates Based on HHS Breach Portal: Breaches Affecting 500 or More Individuals, Type of Breach

More information

University of Wisconsin-Madison Policy and Procedure

University of Wisconsin-Madison Policy and Procedure Page 1 of 10 I. Policy The Health Information Technology for Economic and Clinical Health Act regulations ( HITECH ) amended the Health Information Portability and Accountability Act ( HIPAA ) to establish

More information

HIPAA & Privacy Compliance Update

HIPAA & Privacy Compliance Update HIPAA & Privacy Compliance Update Vermont Medical Society FREE Wednesday Webinar Series March 15, 2017 Anne Cramer and Shireen Hart Primmer Piper Eggleston & Cramer PC acramer@primmer.com shart@primmer.com

More information

David C. Marshall, Esq. PACAH 2017 Spring Conference April 27, 2017

David C. Marshall, Esq. PACAH 2017 Spring Conference April 27, 2017 David C. Marshall, Esq. PACAH 2017 Spring Conference April 27, 2017 Privacy and security of patient information held by health care providers remains a concern of the federal government. More resources

More information

HIPAA For Assisted Living WALA iii

HIPAA For Assisted Living WALA iii Table of Contents The Wisconsin Assisted Living Association... ix Mission... ix Vision... ix Values... ix Acknowledgments... ix Who Should Use This Manual... x How to Use This Manual... x Updates and Forms...

More information

Security Rule for IT Staffs. J. T. Ash University of Hawaii System HIPAA Compliance Officer

Security Rule for IT Staffs. J. T. Ash University of Hawaii System HIPAA Compliance Officer Security Rule for IT Staffs J. T. Ash University of Hawaii System HIPAA Compliance Officer jtash@hawaii.edu hipaa@hawaii.edu Disclaimer HIPAA is a TEAM SPORT and everyone has a role in protecting protected

More information

Beam Technologies Inc. Privacy Policy

Beam Technologies Inc. Privacy Policy Beam Technologies Inc. Privacy Policy Introduction Beam Technologies Inc., Beam Dental Insurance Services LLC, Beam Insurance Administrators LLC, Beam Perks LLC, and Beam Insurance Services LLC, (collectively,

More information

2017_Privacy and Information Security_English_Content

2017_Privacy and Information Security_English_Content 2017_Privacy and Information Security_English_Content 2.3 Staff includes all permanent or temporary, full-time, part-time, casual or contract employees, trainees and volunteers, including but not limited

More information

DATA PRIVACY & SECURITY THE CHANGING HIPAA CLIMATE

DATA PRIVACY & SECURITY THE CHANGING HIPAA CLIMATE DATA PRIVACY & SECURITY THE CHANGING HIPAA CLIMATE Melodi (Mel) M. Gates mgates@pattonboggs.com (303) 894-6111 October 25, 2013 THE CHANGING PRIVACY CLIMATE z HEALTH INSURANCE PORTABILITY & ACCOUNTABILITY

More information

CERT Symposium: Cyber Security Incident Management for Health Information Exchanges

CERT Symposium: Cyber Security Incident Management for Health Information Exchanges Pennsylvania ehealth Partnership Authority Pennsylvania s Journey for Health Information Exchange CERT Symposium: Cyber Security Incident Management for Health Information Exchanges June 26, 2013 Pittsburgh,

More information

Breach Notification Remember State Law

Breach Notification Remember State Law Breach Notification HITECH: First federal law mandating breach notification for health care industry Applies to covered entities, business associates, PHR vendors, and PHR service providers FTC regulates

More information

Inside the OCR Investigation/Audit Process 2018 PBI HEALTH LAW INSTITUTE TUESDAY, MARCH 13, 2017 GREGORY M. FLISZAR, J.D., PH.D.

Inside the OCR Investigation/Audit Process 2018 PBI HEALTH LAW INSTITUTE TUESDAY, MARCH 13, 2017 GREGORY M. FLISZAR, J.D., PH.D. Inside the OCR Investigation/Audit Process 2018 PBI HEALTH LAW INSTITUTE TUESDAY, MARCH 13, 2017 GREGORY M. FLISZAR, J.D., PH.D. HIPAA GENERAL RULE PHI may not be disclosed without patient authorization

More information

PRIVACY-SECURITY INCIDENT REPORT

PRIVACY-SECURITY INCIDENT REPORT SECTION I GENERAL INFORMATION Name of Staff Member Reporting Incident PRIVACY-SECURITY INCIDENT REPORT Telephone Number Email Address Division/Office/Facility Unit/Section Supervisor SECTION II PRIVACY

More information

Privacy & Information Security Protocol: Breach Notification & Mitigation

Privacy & Information Security Protocol: Breach Notification & Mitigation The VUMC Privacy Office coordinates compliance with the required notification steps and prepares the necessary notification and reporting documents. The business unit from which the breach occurred covers

More information

Privacy Breach Policy

Privacy Breach Policy 1. PURPOSE 1.1 The purpose of this policy is to guide NB-IRDT employees and approved users on how to proceed in the event of a privacy breach, and to demonstrate to stakeholders that a systematic procedure

More information

WHITE PAPER. HIPAA Breaches Continue to Rise: Avoid Becoming a Casualty

WHITE PAPER. HIPAA Breaches Continue to Rise: Avoid Becoming a Casualty WHITE PAPER HIPAA Breaches Continue to Rise: Avoid Becoming a Casualty WHITE PAPER HIPAA Breaches Continue to Rise: Avoid Becoming a Casualty By Jill Brooks, MD, CHCO and Katelyn Byrne, BSN, RN Data Breaches

More information

Preventing Breaches When Using , Telephone and Fax Machines

Preventing Breaches When Using  , Telephone and Fax Machines Preventing Breaches When Using E-mail, Telephone and Fax Machines Harley HIPAA Presented by the UAMS HIPAA Office, July 26, 2011 Breach Reporting When a use or disclosure occurs that is not allowed by

More information

TERMS OF USE Terms You Your CMT Underlying Agreement CMT Network Subscribers Services Workforce User Authorization to Access and Use Services.

TERMS OF USE Terms You Your CMT Underlying Agreement CMT Network Subscribers Services Workforce User Authorization to Access and Use Services. TERMS OF USE A. PLEASE READ THESE TERMS CAREFULLY. YOUR ACCESS TO AND USE OF THE SERVICES ARE SUBJECT TO THESE TERMS. IF YOU DISAGREE OR CANNOT FULLY COMPLY WITH THESE TERMS, DO NOT ATTEMPT TO ACCESS AND/OR

More information

3/24/2014. Agenda & Objectives. HIPAA Security Rule. Compliance Institute. Background and Regulatory Overlay. OCR Statistics/

3/24/2014. Agenda & Objectives. HIPAA Security Rule. Compliance Institute. Background and Regulatory Overlay. OCR Statistics/ Compliance Institute Session 501: Implementing a System-Wide Access Monitoring Program Brian D. Annulis Meade, Roach & Annulis, LLP Aegis Compliance & Ethics Center, LLP 4147 N. Ravenswood Avenue Suite

More information

NMHC HIPAA Security Training Version

NMHC HIPAA Security Training Version NMHC HIPAA Security Training 2017 Version HIPAA Data Security HIPAA Data Security is intended to provide the technical controls to ensure electronic Protected Health Information (PHI) is kept secure and

More information

Data Backup and Contingency Planning Procedure

Data Backup and Contingency Planning Procedure HIPAA Security Procedure HIPAA made Easy Data Backup and Contingency Planning Procedure Please fill in date implemented and updates for your facility: Goal: This document will serve as our back-up storage

More information

Steffanie Hall, RHIA HIM Director/Privacy Officer 1201 West 12 th Emporia, Kansas ext

Steffanie Hall, RHIA HIM Director/Privacy Officer 1201 West 12 th Emporia, Kansas ext JOINT NOTICE OF PRIVACY PRACTICES NEWMAN REGIONAL HEALTH, NEWMAN REGIONAL HEALTH MEDICAL PARTNERS, HOSPICE, NEWMAN PHYSICAL THERAPY, COMMUNITY WELLNESS AND MEMBERS OF THE NEWMAN REGIONAL HEALTH ORGANIZED

More information

Technology Workshop HIPAA Security Risk Assessment: What s Next? January 9, 2014

Technology Workshop HIPAA Security Risk Assessment: What s Next? January 9, 2014 Technology Workshop HIPAA Security Risk Assessment: What s Next? January 9, 2014 Welcome! Thank you for joining us today. In today s call we ll cover the Security Assessment and next steps. If you want

More information

GM Information Security Controls

GM Information Security Controls : Table of Contents 2... 2-1 2.1 Responsibility to Maintain... 2-2 2.2 GM s Right to Monitor... 2-2 2.3 Personal Privacy... 2-3 2.4 Comply with Applicable Laws and Site Specific Restrictions... 2-3 2.5

More information

Into the Breach: Breach Notification Requirements in the Wake of the HIPAA Omnibus Rule

Into the Breach: Breach Notification Requirements in the Wake of the HIPAA Omnibus Rule Into the Breach: Breach Notification Requirements in the Wake of the HIPAA Omnibus Rule The Twenty-Second National HIPAA Summit Healthcare Privacy and Security After HITECH and Health Reform Rebecca Williams,

More information

Electronic Communication of Personal Health Information

Electronic Communication of Personal Health Information Electronic Communication of Personal Health Information A presentation to the Porcupine Health Unit (Timmins, Ontario) May 11 th, 2017 Nicole Minutti, Health Policy Analyst Agenda 1. Protecting Privacy

More information

SECURITY & PRIVACY DOCUMENTATION

SECURITY & PRIVACY DOCUMENTATION Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive

More information

EXHIBIT A. - HIPAA Security Assessment Template -

EXHIBIT A. - HIPAA Security Assessment Template - Department/Unit: Date: Person(s) Conducting Assessment: Title: 1. Administrative Safeguards: The HIPAA Security Rule defines administrative safeguards as, administrative actions, and policies and procedures,

More information

Data Inventory and Classification, Physical Devices and Systems ID.AM-1, Software Platforms and Applications ID.AM-2 Inventory

Data Inventory and Classification, Physical Devices and Systems ID.AM-1, Software Platforms and Applications ID.AM-2 Inventory Audience: NDCBF IT Security Team Last Reviewed/Updated: March 2018 Contact: Henry Draughon hdraughon@processdeliveysystems.com Overview... 2 Sensitive Data Inventory and Classification... 3 Applicable

More information

HIPAA Compliance: What it is, what it means, and what to do about it. Adam Carlson, Security Solutions Consultant Intapp

HIPAA Compliance: What it is, what it means, and what to do about it. Adam Carlson, Security Solutions Consultant Intapp HIPAA Compliance: What it is, what it means, and what to do about it. Adam Carlson, Security Solutions Consultant Intapp Agenda Introductions HIPAA Background and History Overview of HIPAA Requirements

More information

UTAH VALLEY UNIVERSITY Policies and Procedures

UTAH VALLEY UNIVERSITY Policies and Procedures Page 1 of 5 POLICY TITLE Section Subsection Responsible Office Private Sensitive Information Facilities, Operations, and Information Technology Information Technology Office of the Vice President of Information

More information

HIPAA COMPLIANCE AND

HIPAA COMPLIANCE AND INTRONIS MSP SOLUTIONS BY BARRACUDA HIPAA COMPLIANCE AND DATA PROTECTION CONTENTS Introduction... 3 The HIPAA Security Rule... 4 The HIPAA Omnibus Rule... 6 HIPAA Compliance and Intronis Cloud Backup and

More information

Healthcare Privacy and Security:

Healthcare Privacy and Security: Healthcare Privacy and Security: Breach prevention and mitigation/ Insuring for breach Colin J. Zick Foley Hoag LLP (617) 832-1000 www.foleyhoag.com www.securityprivacyandthelaw.com Boston Bar Association

More information

Terms used, but not otherwise defined, in this Agreement shall have the same meaning as those terms in the HIPAA Privacy Rule.

Terms used, but not otherwise defined, in this Agreement shall have the same meaning as those terms in the HIPAA Privacy Rule. Medical Privacy Version 2018.03.26 Business Associate Agreement This Business Associate Agreement (the Agreement ) shall apply to the extent that the Lux Scientiae HIPAA Customer signee is a Covered Entity

More information

HIPAA/HITECH Privacy & Security Checklist Assessment HIPAA PRIVACY RULE

HIPAA/HITECH Privacy & Security Checklist Assessment HIPAA PRIVACY RULE 164.502 Develop "minimum necessary" policies for: HIPAA PRIVACY RULE 164.514 - Uses 15 Exempts disclosure for the purpose of treatment from the minimum necessary standard. Page references for - Routine

More information

HIPAA Omnibus Notice of Privacy Practices

HIPAA Omnibus Notice of Privacy Practices HIPAA Omnibus Notice of Privacy Practices Revised 2013 Urological Associates of Bridgeport, PC 160 Hawley Lane, Suite 002, Trumbull, CT 06611 Tel: 203-375-3456 Fax: 203-375-4456 Effective as of April/14/2003

More information

Compliance A primer. Surveys indicate that 80% of the spend on IT security technology is driven by the need to comply with regulatory legislation.

Compliance A primer. Surveys indicate that 80% of the spend on IT security technology is driven by the need to comply with regulatory legislation. Compliance A primer Surveys indicate that 80% of the spend on IT security technology is driven by the need to comply with regulatory legislation. The growth in the sharing of sensitive data combined with

More information

IMPORTANT INSTRUCTIONS:

IMPORTANT INSTRUCTIONS: IMPORTANT INSTRUCTIONS: PLEASE MAIL THIS FORM ALONG WITH YOUR AUTHORIZATION AGREEMENT BACK TO US AT: THE POLYCLINIC ATTN: EHR/MYCHART 1145 BROADWAY SEATTLE, WA 98122 PLEASE ALSO PROVIDE US WITH A PHONE

More information

Checklist: Credit Union Information Security and Privacy Policies

Checklist: Credit Union Information Security and Privacy Policies Checklist: Credit Union Information Security and Privacy Policies Acceptable Use Access Control and Password Management Background Check Backup and Recovery Bank Secrecy Act/Anti-Money Laundering/OFAC

More information

NOTICE OF PRIVACY PRACTICES

NOTICE OF PRIVACY PRACTICES NOTICE OF PRIVACY PRACTICES Chmura Orthodontics ( Practice ) understands the important of keeping your personal information private. Personal information includes: your name, postal address, e-mail address,

More information

HIPAA Compliance Officer Training By HITECH Compliance Associates. Building a Culture of Compliance

HIPAA Compliance Officer Training By HITECH Compliance Associates. Building a Culture of Compliance HIPAA Compliance Officer Training By HITECH Compliance Associates Building a Culture of Compliance Your Instructor Is Michael McCoy Nationally Recognized HIPAA Expert » Nothing contained herein should

More information

HIPAA/HITECH Act Update HCCA South Central Regional Annual Conference December 2, Looking Back at 2011

HIPAA/HITECH Act Update HCCA South Central Regional Annual Conference December 2, Looking Back at 2011 HIPAA/HITECH Act Update HCCA South Central Regional Annual Conference December 2, 2012 Phyllis F. Granade The Granade Law Firm Atlanta, GA (678) 705 2507 pgranade@granadelaw.com www.granadelaw.com Looking

More information

Regulation P & GLBA Training

Regulation P & GLBA Training Regulation P & GLBA Training Overview Regulation P governs the treatment of nonpublic personal information about consumers by the financial institution. (Gramm-Leach-Bliley Act of 1999) The GLBA is composed

More information

Identity Theft Prevention Policy

Identity Theft Prevention Policy Identity Theft Prevention Policy Purpose of the Policy To establish an Identity Theft Prevention Program (Program) designed to detect, prevent and mitigate identity theft in connection with the opening

More information

Virtua Health, Inc. is a 501 (c) (3) non-profit corporation located in Marlton, New Jersey ( Virtua ).

Virtua Health, Inc. is a 501 (c) (3) non-profit corporation located in Marlton, New Jersey ( Virtua ). myvirtua.org Terms of Use PLEASE READ THESE TERMS OF USE CAREFULLY Virtua Health, Inc. is a 501 (c) (3) non-profit corporation located in Marlton, New Jersey ( Virtua ). Virtua has partnered with a company

More information

Boerner Consulting, LLC Reinhart Boerner Van Deuren s.c.

Boerner Consulting, LLC Reinhart Boerner Van Deuren s.c. Catherine M. Boerner, Boerner Consulting LLC Heather Fields, 1 Discuss any aggregate results of the desk audits Explore the Sample(s) Requested and Inquire of Management requests for the full on-site audits

More information

Protecting Personally Identifiable Information (PII) Privacy Act Training for Housing Counselors

Protecting Personally Identifiable Information (PII) Privacy Act Training for Housing Counselors Protecting Personally Identifiable Information (PII) Privacy Act Training for Housing Counselors Presented by the Office of Housing Counseling and The Office of the Chief Information Officer Privacy Program

More information

Element Finance Solutions Ltd Data Protection Policy

Element Finance Solutions Ltd Data Protection Policy Element Finance Solutions Ltd Data Protection Policy CONTENTS Section Title 1 Introduction 2 Why this Policy Exists 3 Data Protection Law 4 Responsibilities 5 6 7 8 9 10 Data Protection Impact Assessments

More information

TERMS & CONDITIONS PLEASE READ THESE TERMS AND CONDITIONS CAREFULLY BEFORE USING THE SITE

TERMS & CONDITIONS PLEASE READ THESE TERMS AND CONDITIONS CAREFULLY BEFORE USING THE SITE TERMS & CONDITIONS PLEASE READ THESE TERMS AND CONDITIONS CAREFULLY BEFORE USING THE SITE 1. General The term PPS refers to: Professional Provident Society Holdings Trust, (The Holding Trust); Professional

More information

efolder White Paper: HIPAA Compliance

efolder White Paper: HIPAA Compliance efolder White Paper: HIPAA Compliance November 2015 Copyright 2015, efolder, Inc. Abstract This paper outlines how companies can use certain efolder services to facilitate HIPAA and HITECH compliance within

More information

Housecall Privacy Statement Statement Date: 01/01/2007. Most recent update 09/18/2009

Housecall Privacy Statement Statement Date: 01/01/2007. Most recent update 09/18/2009 Housecall Privacy Statement Statement Date: 01/01/2007. Most recent update 09/18/2009 Privacy Policy Intent: We recognize that privacy is an important issue, so we design and operate our services with

More information

Seven gray areas of HIPAA you can t ignore

Seven gray areas of HIPAA you can t ignore White Paper: HIPAA Gray Areas Seven gray areas of HIPAA you can t ignore This guide exists to shed some light on some of the gray areas of HIPAA (the Health Insurance Portability and Accountability Act).

More information

HIPAA AND SECURITY. For Healthcare Organizations

HIPAA AND  SECURITY. For Healthcare Organizations HIPAA AND EMAIL SECURITY For Healthcare Organizations Table of content Protecting patient information 03 Who is affected by HIPAA? 06 Why should healthcare 07 providers care? Email security & HIPPA 08

More information

1 Privacy Statement INDEX

1 Privacy Statement INDEX INDEX 1 Privacy Statement Mphasis is committed to protecting the personal information of its customers, employees, suppliers, contractors and business associates. Personal information includes data related

More information

Cleveland State University General Policy for University Information and Technology Resources

Cleveland State University General Policy for University Information and Technology Resources Cleveland State University General Policy for University Information and Technology Resources 08/13/2007 1 Introduction As an institution of higher learning, Cleveland State University both uses information

More information

Website Privacy Policy

Website Privacy Policy Website Privacy Policy Village Emergency Center Privacy Policy Updated: 1/22/18. PLEASE READ THIS PRIVACY POLICY (Privacy Policy) CAREFULLY. By accessing and using this website, you agree to be bound by

More information

Don t Be the Next Headline! PHI and Cyber Security in Outsourced Services.

Don t Be the Next Headline! PHI and Cyber Security in Outsourced Services. Don t Be the Next Headline! PHI and Cyber Security in Outsourced Services. June 2017 Melanie Duerr Fazzi Associates Partner, Director of Coding Operations Jami Fisher Fazzi Associates Chief Information

More information

Internet, , Social Networking, Mobile Device, and Electronic Communication Policy

Internet,  , Social Networking, Mobile Device, and Electronic Communication Policy TABLE OF CONTENTS Internet, Email, Social Networking, Mobile Device, and... 2 Risks and Costs Associated with Email, Social Networking, Electronic Communication, and Mobile Devices... 2 Appropriate use

More information

Mobile Application Privacy Policy

Mobile Application Privacy Policy Mobile Application Privacy Policy Introduction This mobile application is hosted and operated on behalf of your health plan. As such, some information collected through the mobile application may be considered

More information

ecare Vault, Inc. Privacy Policy

ecare Vault, Inc. Privacy Policy ecare Vault, Inc. Privacy Policy This document was last updated on May 18, 2017. ecare Vault, Inc. owns and operates the website www.ecarevault.com ( the Site ). ecare Vault also develops, operates and

More information

The HIPAA Omnibus Rule

The HIPAA Omnibus Rule The HIPAA Omnibus Rule What You Should Know and Do as Enforcement Begins Rebecca Fayed, Associate General Counsel and Privacy Officer Eric Banks, Information Security Officer 3 Biographies Rebecca C. Fayed

More information