HMIS (HOMELESS MANAGEMENT INFORMATION SYSTEM) SECURITY AWARENESS TRAINING. Created By:

Similar documents
HIPAA and Research Contracts JILL RAINES, ASSISTANT GENERAL COUNSEL AND UNIVERSITY PRIVACY OFFICIAL

HIPAA Federal Security Rule H I P A A

HIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012

University of Mississippi Medical Center Data Use Agreement Protected Health Information

HIPAA Omnibus Notice of Privacy Practices

HIPAA Privacy and Security Training Program

RETINAL CONSULTANTS OF ARIZONA, LTD. HIPAA NOTICE OF PRIVACY PRACTICES. Our Responsibilities. Our Uses and Disclosures

HIPAA Privacy & Security Training. Privacy and Security of Protected Health Information

Website Privacy Policy

For any questions regarding this notice call: Meredith Damboise, Privacy Officer , ext. 17

HIPAA and Social Media and other PHI Safeguards. Presented by the UAMS HIPAA Office August 2016 William Dobbins

Sample BYOD Policy. Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited.

AUTHORIZATION TO RELEASE HEALTH INFORMATION

IMPORTANT INSTRUCTIONS:

Putting It All Together:

HIPAA For Assisted Living WALA iii

Employee Security Awareness Training Program

Your Information. Your Rights. Our Responsibilities.

Attachment B Newtopia Wellness Program and Genetic Testing. The Health Risk Assessment also invites individuals to undergo genetic testing.

HIPAA & Privacy Compliance Update

HIPAA and HIPAA Compliance with PHI/PII in Research

HIPAA. Developed by The University of Texas at Dallas Callier Center for Communication Disorders

Therapy Provider Portal. User Guide

Enterprise Income Verification (EIV) System User Access Authorization Form

UT HEALTH SAN ANTONIO HANDBOOK OF OPERATING PROCEDURES

HIPAA FOR BROKERS. revised 10/17

Domestic Violence Client Intake Form

SFDPH Annual Privacy and Data Security Training Module

WASHINGTON UNIVERSITY HIPAA Privacy Policy # 7. Appropriate Methods of Communicating Protected Health Information

HIPAA COMPLIANCE AND DATA PROTECTION Page 1

LifeWays Operating Procedures

NOTICE OF PRIVACY PRACTICES


Campus Health Your Information Your Rights Our Responsibilities

Security and Privacy Breach Notification

Virtua Health, Inc. is a 501 (c) (3) non-profit corporation located in Marlton, New Jersey ( Virtua ).

HIPAA Security and Privacy Policies & Procedures

Data Compromise Notice Procedure Summary and Guide

FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? L QUESTIONS?

Beam Technologies Inc. Privacy Policy

North Carolina Health Information Exchange Authority. User Access Policy for NC HealthConnex

Acknowledgement of Receipt of Notice of Privacy Practices

The Relationship Between HIPAA Compliance and Business Associates

University Policies and Procedures ELECTRONIC MAIL POLICY

2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY

Frequently Asked Questions. My life. My healthcare. MyChart.

Olympia Family Medicine 5949 Harbour Park Drive Midlothian, VA 23112

TABLE OF CONTENTS. I. Policy 2. III. Supportive Data 2. IV. Signature Block with Effective Date 3. V. Definitions 3. VI. Protocol 4. VII.

Data Backup and Contingency Planning Procedure

Notice of Privacy Practices Page 1

Lesson Three: False Claims Act and Health Insurance Portability and Accountability Act (HIPAA)

Federal Breach Notification Decision Tree and Tools

GDPR AMC SAAS AND HOSTED MODULES. UK version. AMC Consult A/S June 26, 2018 Version 1.10

The New RoI. Effective 1 November 2014

Preventing Breaches When Using , Telephone and Fax Machines

HIPAA Privacy & Security Training. HIPAA The Health Insurance Portability and Accountability Act of 1996

Terms used, but not otherwise defined, in this Agreement shall have the same meaning as those terms in the HIPAA Privacy Rule.

Revised January

HIPAA How to Comply with Limited Time & Resources. Jonathan Pantenburg, MHA, Senior Consultant August 17, 2017

Compliance & HIPAA Annual Education

NMHC HIPAA Security Training Version

Departmental Reports: Posted 48 Hours After the Report Reaches a Signed Status

University of Wisconsin-Madison Policy and Procedure

COLLECTION & HOW THE INFORMATION WILL BE USED

PATIENT REGISTRATION

It s still very important that you take some steps to help keep up security when you re online:

HIPAA COMPLIANCE AND

ALLERGY CONSULTANTS, P.A. NOTICE OF PRIVACY PRACTICE 9 / 23 / 13

VETDATA PRIVACY POLICY

Compliance A primer. Surveys indicate that 80% of the spend on IT security technology is driven by the need to comply with regulatory legislation.

Mobile Application Privacy Policy

eprost System Policies & Procedures

The simplified guide to. HIPAA compliance

UCOP ITS Systemwide CISO Office Systemwide IT Policy

Auditing and Monitoring for HIPAA Compliance. HCCA COMPLIANCE INSTITUTE 2003 April, Presented by: Suzie Draper Sheryl Vacca, CHC

Texas Education Agency

Banner Health Information Security and Privacy Training Team. Morgan Raimo Paul Lockwood

TERMS OF USE Terms You Your CMT Underlying Agreement CMT Network Subscribers Services Workforce User Authorization to Access and Use Services.

BCN Telecom, Inc. Customer Proprietary Network Information Certification Accompanying Statement

Agency Registration and Broker Certification

Cleveland State University General Policy for University Information and Technology Resources

Secure Messaging Mobile App Privacy Policy. Privacy Policy Highlights

Computer Security Incident Response Plan. Date of Approval: 23-FEB-2014

HIPAA Security Awareness Training

FLORIDA S PREHOSPITAL EMERGENCY MEDICAL SERVICES TRACKING & REPORTING SYSTEM

HIPAA UPDATE. Michael L. Brody, DPM

Department of Public Health O F S A N F R A N C I S C O

Texas Health Resources

Department of Public Health O F S A N F R A N C I S C O

Information Technology Standards

Subject: University Information Technology Resource Security Policy: OUTDATED

Change Healthcare CLAIMS Provider Information Form *This form is to ensure accuracy in updating the appropriate account

Privacy Impact Assessment (PIA) Tool

IT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I

CTI BioPharma Privacy Notice

Cell Phone Policy. 1. Purpose: Establish a policy for cell phone use and compensation allowance.

Department of Public Health O F S A N F R A N C I S C O

Excelity Privacy Statement & Terms of Use. August 2017

LIFEWAY PREMARITAL INFORMATION FORM LIFEWAY REFERRAL INFORMATION

HIPAA/HITECH Privacy & Security Checklist Assessment HIPAA PRIVACY RULE

Transcription:

HMIS (HOMELESS MANAGEMENT INFORMATION SYSTEM) SECURITY AWARENESS TRAINING Created By:

Overview The purpose of this presentation is to emphasize the importance of security when using HMIS. Client information is confidential and should always be treated as such. This presentation provides an overview for the following topics: HUD HMIS Data Standards Basic Requirements User Authentication/Access Defining Security Client Confidentiality HIPAA

HUD s HMIS Data Standards The purpose of the data standards are to ensure that every HMIS captures the information necessary to fulfill HUD reporting requirements while protecting the privacy and informational security of all homeless individuals. The most recent version is June 2017. You may access these data standards at: https://www.hudexchange.info/resources/documents/hmis-data- Dictionary.pdf

Basic Security Requirements HMIS Users Need: Unique username and password Signed Electronic Security Awareness Agreement (digital copy in HMIS) Security Awareness valid for 365 days Each Computer/Network Needs: A secure location Anti-virus software Individual or network firewall

Username and Password Every user accessing HMIS must have a unique username and password A unique password includes: At least 1 number At least 1 lowercase letter At least 1 capital letter At least 6 characters long At least 1 $pecial character Good: [Na$car#39] Bad: Pass.1

HMIS access Users are assigned a role in the HMIS application. A role defines how much information and the type of information you can access. Your agency and the HMIS Manager will determine your role access. HMIS is built to automatically log you out if there is inactivity beyond 30 minutes. Log out of HMIS when away from the workstation. Do not share your login information with anyone!

Physical Access / Location Secure workstations (It is your responsibility for good computer practices) Lock offices Place computer monitors away from others view Use a privacy screen when necessary Lock computer screens when away from the workstation (windows logo key + L)

Uses of HMIS HMIS should not be used for: Personal gain Bias opinions Stalking Sharing with others outside of service providers Curiosity HMIS should be used for: Tracking enrollments/assessments Referring clients Creating case notes Coordinating services for a client

Defining Security Security refers to the protection of clients personal protected information and sensitive program information from unauthorized access, disclosure, use, or modification.

Client Confidentiality Agencies and Individual Users of HMIS are required to comply with federal, state, and local confidentiality laws Agencies and Users are required to comply with limits to data collection (relevant, appropriate, lawful) Agencies are required to post sign at intake or comparable location with general reasons for information collection and reference to privacy policy Agencies may infer consent for uses in the posted sign and written privacy policy

Protecting Clients Privacy Client information should only be shared/searched on a need-to-know basis. Need-to-know: 1. The legitimate requirement of a person to access sensitive information that is critical to the performance of an authorized, assigned mission in connection with services to a client. 2. The necessity for access to specific information required to carry out official duties. HMIS Team monitors individual HMIS use. User must be able to support access to client s file. Violations must be reported to the Security Manager, Haven for Hope HIPAA Officer, in some cases, to government agencies and the Client. Violations may result in termination of use rights, disciplinary action, and in extreme cases, prosecution.

Privacy and Security Laws Federal Health Insurance Portability and Accountability Act (HIPAA,1996) Texas Medical Records Privacy Act (MRPA, 2012) 42 CFR Part 2 Confidentiality of Alcohol and Drug Abuse Patient Records (HHS)

WHAT IS HIPAA? The Health Insurance Portability and Accountability Act of 1996 (HIPAA) The HIPAA Rules apply to Covered Entities and Business Associates. Covered Entities include certain health care providers, health plans, and health care clearing houses. Hospitals & Health Clinics Some mental health & substance abuse treatment programs A Business Associate is any person or entity that: Performs an activity or function on behalf of a covered entity that involves Protected Health Information (PHI), OR Provides legal, accounting, management, administrative, financial, or other services for a covered entity that involves PHI.

What Information Must Be Protected? You must protect an individual s Protected Health Information (PHI) which is collected or created as a consequence of providing care. These rules apply to you when you view, use, and share PHI. PHI: Is information related to a patient s past, present or future physical and/or mental health condition Can be in any form: written, spoken, or electronic Includes at least one of the 18 identifiers:

Protected Health Information (PHI) Identifiers Name Postal Address All elements of dates except year (ex:dob) Telephone number Fax Number Email address URL address IP address Social Security number Account numbers Certificates/Licenses number Medical record number Health care beneficiary # Device identifiers and their serial numbers Vehicle identifiers & serial numbers Biometric identifiers (finger & voice prints) Full face photos & other comparable images Any other unique identifying number, code, or characteristic

Disclosures of PHI With written consent, or May be disclosed: If required by court order, or In a medical emergency, or For research, audit, or program evaluation To another health care provider for purposes of Treatment, Payment, or health care Operations (TPO) (e.g. to a partner, physician, or hospital)

Disclosures of PHI To the client In accordance with client s written authorization To a client s legal representative or a family member involved in client care To report child abuse or neglect, abuse of an adult, or domestic violence Haven for Hope considers that other disclosure is non-routine and requires approval by the Haven for Hope HIPAA Officer

Keep in Mind Use PHI only as necessary to perform your job duties Use & disclose the minimum necessary to perform job duties If you need to use or disclose PHI outside of routine uses/disclosures, please consult the Haven for Hope Attorney/HIPAA Officer first Haven for Hope Attorney & HIPAA Officer: HMIS Security Officer: Gene Ann Herrin (210) 220-2157 David Huete (210) 220-2352 geneann.herrin@havenforhope.org david.huete@havenforhope.org

Read & Sign Digital Copy AGENCY/ORGANIZATION NAME: LOCATION: San Antonio Homeless Management Information System (HMIS) USER CONFIDENTIALITY AGREEMENT I understand that I will be allowed access to confidential information and/or records in order to perform my specific job duties. I further understand and agree that I am not to disclose such confidential information and/or records without the prior consent of the appropriate authority(s). I understand that all USERID/ Passwords to access the HMIS are issued on an individual basis. I further understand that I am solely responsible for all information obtained, through system access, using my unique identification. At no time will I allow any other person to use of my USERID/Password to logon to the HMIS. I understand that accessing or releasing confidential information and/or records, or causing confidential information and/or records to be accessed or released except as allowed in the HMIS Security Awareness training, outside the scope of my assigned job duties would constitute a violation of this agreement. I understand my supervisor will be notified immediately of any violation and disciplinary action will be taken, up to termination of employment. By affixing my signature to this document I acknowledge that I have been apprised of the relevant laws concerning access, use, maintenance and disclosure of confidential information and/or records available to me through my use of the HMIS. I further agree that it is my responsibility to assure the confidentiality of all information I access through use of HMIS, even after my access to HMIS has ended. Pursuant to this agreement I certify that I have read and understand the laws concerning confidential information and/or records and the HMIS Security Awareness Training materials. User Signature Date Job Title Print User Name Email