The Legal Health Record and E-Discovery: Where You Need to Be

Similar documents
Developing Your Records Retention Schedule: It s Bigger Than Just Health Records

HIPAA Security: What Everyone Should Know

Federal Rules of Civil Procedure IT Obligations For

Putting It All Together:

Electronic Discovery in Employment Cases: What Every Employer Needs to Know. Presented By: Shannon Cohorst Johnson

Checklist for Rule 16(c) Pretrial Conference for Computer-Based Discovery

MANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors

Managing Your Record Retention Policy Safely

Development of your Company s Record Information System and Disaster Preparedness. The National Emergency Management Summit

E-DISCOVERY. The process in which electronic data is sought, located, secured, using it as evidence in a civil or criminal legal case.

Employee Security Awareness Training Program

Secure Messaging Mobile App Privacy Policy. Privacy Policy Highlights

Acceptable Use Policy

How to Respond to a HIPAA Breach. Tuesday, Oct. 25, 2016

Records Management and Retention

UTAH VALLEY UNIVERSITY Policies and Procedures

Records Retention Policy

HIPAA Security Manual

Data Protection Policy

Subject: University Information Technology Resource Security Policy: OUTDATED

The HIPAA Omnibus Rule

Elements of a Swift (and Effective) Response to a HIPAA Security Breach

HIPAA in 2017: Hot Topics You Can t Ignore. Danika Brinda, PhD, RHIA, CHPS, HCISPP March 16, 2017

SAMPLE LITIGATION HOLD NOTICES

Security and Privacy Breach Notification

HIPAA Privacy & Security Training. Privacy and Security of Protected Health Information

Element Finance Solutions Ltd Data Protection Policy

New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers

Security Policies and Procedures Principles and Practices

HIPAA Compliance: What it is, what it means, and what to do about it. Adam Carlson, Security Solutions Consultant Intapp

UT HEALTH SAN ANTONIO HANDBOOK OF OPERATING PROCEDURES

Preservation, Retrieval & Production. Electronic Evidence: Tips, Tactics & Technology. Issues

Computer Security Incident Response Plan. Date of Approval: 23-FEB-2014

All Aboard the HIPAA Omnibus An Auditor s Perspective

SPRING-FORD AREA SCHOOL DISTRICT

2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY

Applications for Preservation and Production in our Digital World

Checklist: Credit Union Information Security and Privacy Policies

Privacy Breach Policy

Cyber Risks in the Boardroom Conference

The HIPAA Security & Privacy Rule How Municipalities Can Prepare for Compliance

Information Governance, the Next Evolution of Privacy and Security

Ashford Board of Education Ashford, Connecticut POLICY REGARDING RETENTION OF ELECTRONIC RECORDS AND INFORMATION

E-DISCOVERY PRESENTATION E-DISCOVERY 101: BASICS

CERT Symposium: Cyber Security Incident Management for Health Information Exchanges

Reducing ediscovery Cost and Risk with Intelligent Information Governance Dean Gonsowski, Esq.

NSF Data Management Plan Template Duke University Libraries Data and GIS Services

Electronic Communication of Personal Health Information

Data Protection Policy

Data Compromise Notice Procedure Summary and Guide

University Policies and Procedures ELECTRONIC MAIL POLICY

Cloud Computing Standard 1.1 INTRODUCTION 2.1 PURPOSE. Effective Date: July 28, 2015

HIPAA Privacy, Security and Breach Notification

Enterprise Vault & e-discovery

Apex Information Security Policy

General Data Protection Regulation April 3, Sarah Ackerman, Managing Director Ross Patz, Consultant

POLICY TITLE: Record Retention and Destruction POLICY NO: 277 PAGE 1 of 6

To Document or Not to Document: That is the Question DPLE 182

UCOP Guidelines for Protection of Electronic Personal Information Data and for Security Breach Notification

UNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY October 25, 2017

Information Security Data Classification Procedure

Data Protection Policy

VIEWING AND/OR USE AND/OR COMMUNICATION IS CONSTRUED AS ACCEPTANCE OF THE TERMS OF THIS POLICY

Standard for Security of Information Technology Resources

Southington Public Schools

SECURITY & PRIVACY DOCUMENTATION

Policies & Regulations

What information is collected from you and how it is used

encrypted, and that all portable devices (laptops, phones, thumb drives, etc.) be encrypted while in use and while at rest?

HIPAA-HITECH: Privacy & Security Updates for 2015

HIPAA Federal Security Rule H I P A A

Records Management at MSU. Hillary Gatlin University Archives and Historical Collections January 27, 2017

Policy Summary: This guidance outlines ACAOM s policy and procedures for managing documents. Table of Contents

DATA PRIVACY & SECURITY THE CHANGING HIPAA CLIMATE

THE SEDONA CONFERENCE JUMPSTART OUTLINE :

UNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY September 20, 2017

Schedule Identity Services

TOP TRENDING THE MAGAZINE. Menu. 1 of 6 6/7/16 4:38 PM. Keep it Simple, Legal. A New Role Bridging Business and Legal at Shell

OUTDATED. Policy and Procedures 1-12 : University Institutional Data Management Policy

8/28/2017. What Is a Federal Record? What is Records Management?

Security and Privacy Governance Program Guidelines

HIPAA How to Comply with Limited Time & Resources. Jonathan Pantenburg, MHA, Senior Consultant August 17, 2017

Privacy Shield Policy

Creative Funding Solutions Limited Data Protection Policy

Virginia Commonwealth University School of Medicine Information Security Standard

Motorola Mobility Binding Corporate Rules (BCRs)

Into the Breach: Breach Notification Requirements in the Wake of the HIPAA Omnibus Rule

WASHINGTON UNIVERSITY HIPAA Privacy Policy # 7. Appropriate Methods of Communicating Protected Health Information

TechTarget, Inc. Privacy Policy

USER CORPORATE RULES. These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy.

5/6/2013. Creating and preserving records that contain adequate and proper documentation of the organization.

PLEASE NOTE. - Text the phrase MICHAELBERWA428 to the number /23/2016 1

Critical HIPAA Privacy & Security Crossover Areas

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

Terms and Conditions between Easy Time Clock, Inc. And Easy Time Clock Client

CLEANING OUT THE DATA CLOSET

Conference for Food Protection. Standards for Accreditation of Food Protection Manager Certification Programs. Frequently Asked Questions

Hire Counsel + ACEDS. Unified Team, National Footprint Offices. ediscovery Centers

Learning Management System - Privacy Policy

Transcription:

The Legal Health Record and E-Discovery: Where You Need to Be Webinar June 9, 2009 Practical Tools for Seminar Learning Copyright 2009 American Health Information Management Association. All rights reserved.

Disclaimer The American Health Information Management Association makes no representation or guarantee with respect to the contents herein and specifically disclaims any implied guarantee of suitability for any specific purpose. AHIMA has no liability or responsibility to any person or entity with respect to any loss or damage caused by the use of this audio seminar, including but not limited to any loss of revenue, interruption of service, loss of business, or indirect damages resulting from the use of this program. AHIMA makes no guarantee that the use of this program will prevent differences of opinion or disputes with Medicare or other third party payers as to the amount that will be paid to providers of service. As a provider of continuing education the American Health Information Management Association (AHIMA) must assure balance, independence, objectivity and scientific rigor in all of its endeavors. AHIMA is solely responsible for control of program objectives and content and the selection of presenters. All speakers and planning committee members are expected to disclose to the audience: (1) any significant financial interest or other relationships with the manufacturer(s) or provider(s) of any commercial product(s) or services(s) discussed in an educational presentation; (2) any significant financial interest or other relationship with any companies providing commercial support for the activity; and (3) if the presentation will include discussion of investigational or unlabeled uses of a product. The intent of this requirement is not to prevent a speaker with commercial affiliations from presenting, but rather to provide the participants with information from which they may make their own judgments. This seminar's faculty have made no such disclosures. AHIMA 2009 HIM Webinar Series i

Faculty Mary Beth Haugen, MS, RHIA Mary Beth Haugen is president of the Haugen Consulting Group based in Denver, CO, which specializes in the integration of electronic health records. Previously, Ms. Haugen was the director of information services and HIM at Denver Health, implementing the electronic health record, financial and clinical applications. She currently serves on AHIMA s Board of Directors, and is adjunct faculty at Regis University and the University of Cincinnati. Keith Olenik, MA, RHIA, CHP Keith Olenik is principal of the Olenik Consulting Group in Kansas City, MO. Mr. Olenik has over 25 years of experience in a variety of healthcare settings, and is a visiting professor for the University of Cincinnati Health Information Management Program. He is also an author and frequent speaker on topics including electronic health records, electronic discovery, project management, ICD-10 preparation, and HIM functions. AHIMA 2009 HIM Webinar Series ii

Table of Contents Disclaimer... i Faculty... ii Objectives... 1 Electronic Discovery Challenges... 1 Definitions... 2-3 Legal EHR subset of the EHR... 3 Definitions... 4 Polling Question #1... 4 Admissibility... 5 Regulations... 6 Current State... 6 E-Discovery Model... 7 E-Discovery Readiness... 7-8 PRETRIAL CONFERENCE... 9 Federal Rules of Civil Procedure Pretrial Conference... 9-10 Federal Rules of Civil Procedure... 10-11 RECORD MANAGEMENT & DATA INVENTORY... 11 Polling Question #2... 12 Records Management... 12-13 Retention Strategy... 13 Data Inventory Example... 14 Retention Strategy... 14-15 LITIGATION RESPONSE... 15 Litigation Response Strategy... 16 Sample 30(b)(6) Deposition Questions... 17 Litigation Response Strategy... 17-19 LEGAL HOLD... 19 Legal Hold Definitions... 20 Legal Hold Action Plan... 20-21 Special Considerations... 21 MetaData... 22 E-mail Management... 22-23 Portable Devices... 24 Back-up Function... 25 Destruction... 26-27 Education... 27 Compliance and Monitoring... 28 (CONTINUED) AHIMA 2009 HIM Webinar Series

Table of Contents (CONTINUED) Resource/Reference List... 28-29 Audience Questions... 30 Thank You... 30 Audio Seminar Discussion and Audio Seminar Information Online... 31 Upcoming Audio Seminars... 32 AHIMA Distance Education online courses... 32 Thank You/Evaluation Form and CE Certificate (Web Address)... 33 Appendix... 34 Resource/Reference List... 35-36 CE Certificate Instructions AHIMA 2009 HIM Webinar Series

Objectives Understand the issues, risks and challenges of e-discovery Identify records involved in e-discovery and how they are produced Understand the vital role of the pre-trial conference Identify steps necessary for a legal record policy Learn how to create a data inventory 1 Electronic Discovery Challenges 29% follow retention schedules not regularly or when time permits 43% do not include electronic records in retention schedules 43% do not have formal system for records hold orders 49% do not have formal e-mail retention policy 53% reported electronic records not included in record holds 68% had some, considerable, or great difficulty finding and retrieving data from back-up media in response to court-ordered discovery. 2 AHIMA 2009 HIM Webinar Series 1

Definitions Discovery Stage in the litigation process during which both parties use strategies to discover information about a case, the primary focus of which is to determine strength of the opposing party s case. Discovery may involve requests for information as evidence. 3 Definitions What is a record? A record is information created, received, and maintained by an organization or person that is evidence of its activities or operations, and has value requiring its retention for a specific period of time. It can be used in pursuance of legal and regulatory obligations. 4 AHIMA 2009 HIM Webinar Series 2

Definitions Legal Health Record generated at or for a healthcare organization as its business record and is the record that would be released upon request. Custodian of the EHR is the health information manager in collaboration with information technology. 5 Legal EHR subset of the EHR 6 AHIMA 2009 HIM Webinar Series 3

Definitions Four Levels of Custodians Level 1: Primary or Direct Custodian Level 2: Data Owners or Stewards Level 3: Business Associates and Third Parties Official Record and System Custodians 7 Polling Question #1 Does your organization have a Legal Health Record Policy? a) Yes b) No 8 AHIMA 2009 HIM Webinar Series 4

Admissibility Conditions for hearsay exception Documented in the normal course of business Kept in the regular course of business Made at or near the time of the event Made by a person with knowledge of act or event 9 Admissibility of EHRs Type of computer and its acceptance as a standard How the system operates Method and circumstance of how the system keeps records including: Source(s) of information How information is entered How information is retrieved from the computer Controls and checks Reliability Potential for alteration of data 10 AHIMA 2009 HIM Webinar Series 5

Regulations Federal Rules of Civil Procedure December 1, 2006 State Rules Uniform Rules Relating to the Discovery of Electronically Stored Information August 2, 2007 Conference of Chief Justices Individual State Actions 41 states 11 Current State Legal health record defined Data retention strategy created Inventory of electronic systems complete Electronic discovery response plan developed 12 AHIMA 2009 HIM Webinar Series 6

E-Discovery Model 13 E-Discovery Readiness 1. Establish a well thought-out records retention policy considering any statutory or regulatory obligations; 2. Make sure someone is really in charge of records retention; 3. Establish records retention committee; 4. Disseminate record retention policy and provide education; 14 AHIMA 2009 HIM Webinar Series 7

E-Discovery Readiness 5. Establish a response team for litigation that require document preservation; 6. Consult outside counsel on retention policy; 7. Retain an outside vendor to assist with litigation hold if necessary; 8. Encourage outside counsel to raise preservation costs at the earliest time; 15 E-Discovery Readiness 9. Ensure general counsel is educated and knowledgeable about organizational technology and storage strategy; and 10. Be very careful to avoid destruction of documents when there is a clear duty to preserve. 16 AHIMA 2009 HIM Webinar Series 8

PRETRIAL CONFERENCE 17 Federal Rules of Civil Procedure Pretrial Conference Pretrial conferences & early attention to electronic discovery issues Rule 16(b), 26(f) What information is available & the format Preserving discoverable information & form of production Cost & delays of document production Assertion of privilege Stronger role for judges 18 AHIMA 2009 HIM Webinar Series 9

Federal Rules of Civil Procedure Pretrial Conference Duty to disclose & relevance of information Rule 26(a), 26(b)(1) Legal obligation to maintain & disclose relevant records Prior to parties meeting legal, HIM, & IT must meet Limit scope to information relevant to the claim or defense 19 Federal Rules of Civil Procedure Information not reasonably accessible; balancing cost & benefit Rule 26(b), 26(b)(2)(C) Provides that a party need not provide electronically stored information that is inaccessible because of undue burden of cost Party must quantify the burden & show the court that sources are not reasonably accessible Court may still order discovery for good cause judge to balance cost vs. benefit 20 AHIMA 2009 HIM Webinar Series 10

Federal Rules of Civil Procedure Claims of privilege after inadvertent production Rule 26(b)(5) A process to present to the court that information was inadvertently produced (information not requested or relevant to the request) Establish organizational policies outlining examples of privileged and protected work product 21 RECORD MANAGEMENT & DATA INVENTORY 22 AHIMA 2009 HIM Webinar Series 11

Polling Question #2 Does your organization follow a destruction policy that includes electronic data? a) Yes b) No 23 Records Management Written records management policies should address both paper and electronic records Legal health record policy to define subset of data for release of information purposes 24 AHIMA 2009 HIM Webinar Series 12

Records Management: Legal Issues E-Discovery Costs and Sanctions: a symptom, not the problem and the cost of responding to even a single discovery request can be staggering. 25 Retention Strategy 1. Identify and document the method, location, and native file format of information created within the organization; 2. Recognize that the organization is not obligated to retain all information created or received, unless a business or legal obligation exists to maintain the information; 26 AHIMA 2009 HIM Webinar Series 13

Data Inventory Example Application Purpose Clinical (C) Financial (F) HR (H) Operational (O) Email (E) No Data (N) Data Format Archive Yes or No Automated Archive Function Yes or No Data Destruction Yes or No Automated Data Destruction Yes or No Custodian Retention Period 27 Retention Strategy 3. Specifically delineate the organization s electronic records maintenance, storage, and destruction schedules; 4. Provide education on the retention schedule; 5. Determine how the organization would define good faith operation of its electronic information system if called upon to do so; 28 AHIMA 2009 HIM Webinar Series 14

Retention Strategy 6. Establish internal audits or controls to measure compliance with the organization s storage, retention, and destruction policies; and 7. Recognize that the FRCP provide sanctions and safe harbors, while also balancing the availability of information. 29 LITIGATION RESPONSE 30 AHIMA 2009 HIM Webinar Series 15

Litigation Response Strategy Team approach, identify in advance how records will be preserved Info Sec professionals IT/IS professionals Clinical users HIM professionals Legal counsel Identify spokesperson 31 Litigation Response Strategy Spokesperson should be prepared Recognize that the legal community may lack technical background or knowledge Able to clarify complex technical issues and make them comprehensible to the court 32 AHIMA 2009 HIM Webinar Series 16

Sample 30(b)(6) Deposition Questions What steps have been taken to ensure preservation of relevant electronic data? What is the company s document retention policy regarding electronic information and how long has it been in effect? It is published and, if so, where? Are the company s retention policies always complied with? If not, why? Were there former policies and, if so, what were they? 33 Litigation Response Strategy Gather information from disparate computer systems and application Identify, locate, retrieve, preserve and produce data for production and disclosure 34 AHIMA 2009 HIM Webinar Series 17

Litigation Response Strategy Determine the format of information production Electronic information should be produced in a form that preserves substantive data relevant to the case; the format chosen should allow the parties to verify authenticity and authentication for evidentiary purposes 35 Litigation Response Strategy Determine what information must be produced Filtering ESI Key words File types Dates Custodians 36 AHIMA 2009 HIM Webinar Series 18

Litigation Response Strategy Determine the format of information production -.TIF,.PDF,.JPG Data that is not ordinarily viewable when normally printed need not be produced This means paper printouts are okay 37 LEGAL HOLD 38 AHIMA 2009 HIM Webinar Series 19

Legal Hold Definition A legal hold program defines the processes by which information is identified, preserved, and maintained when it has been determined that a duty to preserve has arisen. 39 Legal Hold Action Plan 1. Establish project team or responsible parties; 2. Educate yourselves using all available resources; 3. Identify what actions or events will trigger a legal hold; 4. Develop procedures to notify individuals or departments; 40 AHIMA 2009 HIM Webinar Series 20

Legal Hold Action Plan 5. Determine additional technology or resource needs; 6. Finalize policies; 7. Provide education to all impacted parties 8. Implement and monitor; and 9. Update and revise policies and procedures as necessary. 41 Special Considerations MetaData E-Mail Portable Devices Back-up Tapes/Media 42 AHIMA 2009 HIM Webinar Series 21

MetaData Metadata Defined Data about Data Contextual, Processing, and Information About Use of a Record Generated Through Variety of Sources Significant Potential Benefits of Metadata 43 E-mail Management E-Mail The Cache to the Cash Controversial Don t be caught off guard! Sound Email Management Policies Will Yield Best Results 1. Caselaw is Defining its Use 2. Defined Policies for PHI 3. Retention, Storage, Destruction 4. Educate & Communicate Organizational Practices 5. Routine Part of E-Discovery 44 AHIMA 2009 HIM Webinar Series 22

E-mail Management Individual e-mail management Automatic deletion 14 or 30 days Employee moves or stores e-mail (paper or electronic folders.pst files) Litigation hold requires individual searching 45 E-mail Management Pro-active on-line archiving E-mails archived in a single on-line repository Data maintained for a fixed period of time Information is indexed by any criteria employee, location, subject matter, date, etc. 46 AHIMA 2009 HIM Webinar Series 23

Portable Devices Storage Capacity Communications Proliferation 47 Portable Devices Perform needs assessment Develop protocols for devices: Selection Use policies Maintenance/replacement Use wise risk-management evaluation 48 AHIMA 2009 HIM Webinar Series 24

Back-up Function How are back-ups performed? How often are back-ups performed? Where is the back-up media retained? Does the back-up process perform a full system back-up, or is it incremental? 49 Back-up Function What is backed up? Servers Individual and network devices Mobile devices Can you restore individual e-mails? How will a legal hold be applied to back-up media? 50 AHIMA 2009 HIM Webinar Series 25

Destruction Destruction Plan Instructions and guidelines for destruction Instructions when destruction should be delayed or stopped Include all types of information Review of all laws and guidelines Provide education Safeguards for inappropriate destruction 51 Destruction E-mail Safeguards to ensure integrity Establish destruction guidelines and provide education Consider paper retention issues 52 AHIMA 2009 HIM Webinar Series 26

Destruction Policies on method of destruction Variety of methods: Physically destroy the media Shredding of CD and DVD Overwriting of hard drives using DoD software 53 Education Policies and Procedures Retention E-mail Portable Devices 54 AHIMA 2009 HIM Webinar Series 27

Compliance and Monitoring Establish a monitoring program. Perform periodic audits. Create written reports and communicate. Provide corrective action as needed. 55 Resource/Reference List AHIMA Webinars 8/11/09 Developing Your Records Retention Schedule https://imis.ahima.org/orders/productdetail.cfm?pc=audmc081109 11/17/09 The Legal Health Record: Copy and Paste Guidelines https://imis.ahima.org/orders/productdetail.cfm?pc=audmc111709 4/22/08 Defining and Maintaining the Legal Health Record https://imis.ahima.org/orders/productdetail.cfm?pc=audmc042208 5/20/08 Enterprise Content Management https://imis.ahima.org/orders/productdetail.cfm?pc=audmc052008 6/10/08 Fundamentals of ediscovery https://imis.ahima.org/orders/productdetail.cfm?pc=audmc061008 8/12/08 The Legal Health Record: The Legal Hold Process https://imis.ahima.org/orders/productdetail.cfm?pc=audmc081208 56 AHIMA 2009 HIM Webinar Series 28

Resource/Reference List AHIMA Practice Briefs 5/2/09 Sanction Guidelines for Privacy and Security Breaches http://library.ahima.org/xpedio/groups/public/documents/ahima/bok1_043483.hcsp 2/2/09 Redisclosure of Patient Health Information http://library.ahima.org/xpedio/groups/public/documents/ahima/bok1_042636.hcsp 11/2/08 Management Practices for the Release of Information http://library.ahima.org/xpedio/groups/public/documents/ahima/bok1_040788.hcsp 10/2/08 Enterprise Content and Record Management for Healthcare http://library.ahima.org/xpedio/groups/public/documents/ahima/bok1_040405.hcsp 7/2/08 Mitigating Medical Identity Theft http://library.ahima.org/xpedio/groups/public/documents/ahima/bok1_039058.hcsp 4/2/08 Defining and Disclosing the Designated Record Set and the Legal Health Record http://library.ahima.org/xpedio/groups/public/documents/ahima/bok1_037468.hcsp 2/2/08 Litigation Response Planning and Policies for E-Discovery http://library.ahima.org/xpedio/groups/public/documents/ahima/bok1_036581.hcsp 10/2/07 Developing a Legal Health Record Policy http://library.ahima.org/xpedio/groups/public/documents/ahima/bok1_035543.hcsp 57 Resource/Reference List AHIMA Journal Articles (member login required for some) 2/2/09 Authenticating EHR Metadata http://library.ahima.org/xpedio/groups/secure/documents/ahima/bok1_042635.hcsp 12/30/08 AHIMA Leadership Model: Legal Health Record http://library.ahima.org/xpedio/groups/public/documents/ahima/bok1_042567.pdf 10/2/08 Applying Legal Holds to Electronic Health Records http://library.ahima.org/xpedio/groups/secure/documents/ahima/bok1_040393.hcsp 7/2/08 The Metadata You Need http://library.ahima.org/xpedio/groups/secure/documents/ahima/bok1_039069.hcsp 2/2/08 Metadata, Law and the Real World http://library.ahima.org/xpedio/groups/public/documents/ahima/bok1_036537.hcsp 2/2/08 Litigation Response Planning and Policies for E-Discovery http://library.ahima.org/xpedio/groups/public/documents/ahima/bok1_036581.hcsp 2/2/08 Enterprise Content and Records Management http://library.ahima.org/xpedio/groups/public/documents/ahima/bok1_036480.hcsp 11/2/07 Calculating the Costs of E-Discovery http://library.ahima.org/xpedio/groups/secure/documents/ahima/bok1_035924.hcsp 58 AHIMA 2009 HIM Webinar Series 29

Audience Questions AHIMA 2009 HIM Webinar Series 30

Audio Seminar Discussion Following today s live seminar Available to AHIMA members at www.ahima.org Members Only Communities of Practice (CoP) AHIMA Member ID number and password required Join the e-him Community from your Personal Page. Look under Community Discussions for the Audio Seminar Forum You will be able to: discuss seminar topics network with other AHIMA members enhance your learning experience AHIMA Audio Seminars and Webinars Visit our Web site http://campus.ahima.org for information on the 2009 seminar schedule. While online, you can also register for seminars and webinars or order CDs, MP3s, and webcasts of past seminars. AHIMA 2009 HIM Webinar Series 31

Upcoming Webinars Auditing for Privacy and Security Compliance June 23, 2009 ARRA Town Hall June 25, 2009 MPI Clean Up: It s a Must! July 21, 2009 AHIMA Distance Education Anyone interested in learning more about e-him should consider one of AHIMA s web-based training courses. For more information visit http://campus.ahima.org AHIMA 2009 HIM Webinar Series 32

Thank you for joining us today! Remember visit the AHIMA Audio Seminars/Webinars Web site to complete your evaluation form and receive your CE Certificate online at: http://campus.ahima.org/audio/2009seminars.html Each person seeking CE credit must complete the sign-in form and evaluation in order to view and print their CE certificate. Certificates will be awarded for AHIMA CEUs. AHIMA 2009 HIM Webinar Series 33

Appendix Resource/Reference List... 35-36 CE Certificate Instructions AHIMA 2009 HIM Webinar Series 34

Appendix Resource/Reference List AHIMA Webinars 8/11/09 Developing Your Records Retention Schedule https://imis.ahima.org/orders/productdetail.cfm?pc=audmc081109 11/17/09 The Legal Health Record: Copy and Paste Guidelines https://imis.ahima.org/orders/productdetail.cfm?pc=audmc111709 4/22/08 Defining and Maintaining the Legal Health Record https://imis.ahima.org/orders/productdetail.cfm?pc=audmc042208 5/20/08 Enterprise Content Management https://imis.ahima.org/orders/productdetail.cfm?pc=audmc052008 6/10/08 Fundamentals of ediscovery https://imis.ahima.org/orders/productdetail.cfm?pc=audmc061008 8/12/08 The Legal Health Record: The Legal Hold Process https://imis.ahima.org/orders/productdetail.cfm?pc=audmc081208 AHIMA Practice Briefs 5/2/09 Sanction Guidelines for Privacy and Security Breaches http://library.ahima.org/xpedio/groups/public/documents/ahima/bok1_043483.hcsp 2/2/09 Redisclosure of Patient Health Information http://library.ahima.org/xpedio/groups/public/documents/ahima/bok1_042636.hcsp 11/2/08 Management Practices for the Release of Information http://library.ahima.org/xpedio/groups/public/documents/ahima/bok1_040788.hcsp 10/2/08 Enterprise Content and Record Management for Healthcare http://library.ahima.org/xpedio/groups/public/documents/ahima/bok1_040405.hcsp 7/2/08 Mitigating Medical Identity Theft http://library.ahima.org/xpedio/groups/public/documents/ahima/bok1_039058.hcsp 4/2/08 Defining and Disclosing the Designated Record Set and the Legal Health Record http://library.ahima.org/xpedio/groups/public/documents/ahima/bok1_037468.hcsp 2/2/08 Litigation Response Planning and Policies for E-Discovery http://library.ahima.org/xpedio/groups/public/documents/ahima/bok1_036581.hcsp 10/2/07 Developing a Legal Health Record Policy http://library.ahima.org/xpedio/groups/public/documents/ahima/bok1_035543.hcsp AHIMA Journal Articles 2/2/09 Authenticating EHR Metadata (member login required) http://library.ahima.org/xpedio/groups/secure/documents/ahima/bok1_042635.hcsp 12/30/08 AHIMA Leadership Model: Legal Health Record http://library.ahima.org/xpedio/groups/public/documents/ahima/bok1_042567.pdf CONTINUED AHIMA 2009 HIM Webinar Series 35

Appendix (Resource/Reference List - CONTINUED) 10/2/08 Applying Legal Holds to Electronic Health Records (member login required) http://library.ahima.org/xpedio/groups/secure/documents/ahima/bok1_040393.hcsp 7/2/08 The Metadata You Need (member login required) http://library.ahima.org/xpedio/groups/secure/documents/ahima/bok1_039069.hcsp 2/2/08 Metadata, Law and the Real World http://library.ahima.org/xpedio/groups/public/documents/ahima/bok1_036537.hcsp 2/2/08 Litigation Response Planning and Policies for E-Discovery http://library.ahima.org/xpedio/groups/public/documents/ahima/bok1_036581.hcsp 2/2/08 Enterprise Content and Records Management http://library.ahima.org/xpedio/groups/public/documents/ahima/bok1_036480.hcsp 11/2/07 Calculating the Costs of E-Discovery (member login required) http://library.ahima.org/xpedio/groups/secure/documents/ahima/bok1_035924.hcsp AHIMA 2009 HIM Webinar Series 36

To receive your CE Certificate Please go to the AHIMA Web site http://campus.ahima.org/audio/2009seminars.html click on the link to Sign In and Complete Online Evaluation listed for this webinar. You will be automatically linked to the CE certificate for this webinar after completing the evaluation. Each participant expecting to receive continuing education credit must complete the online evaluation and sign-in information after the webinar, in order to view and print the CE certificate.