SlideShare a Scribd company logo
1 of 29
HIPAA in the Era of EHR Rural Hospital Health Information Technology Conference May 27, 2010 Stacy Harper, JD, MHSA, CPC Forbes Law Group, LLC (913) 341 – 8619 sharper@forbeslawgroup.com
Summary of HIPAA to Date Impact of EMR Implementation Considerations with EHR Overview
Administrative Simplification Privacy Security HITECH Summary of HIPAA To Date
Standardized Electronic Transactions and Code Sets Unique Identifier for Employers Unique Identifier for Providers Unique Identifier for Health Plans HIPAA Administrative Simplification
April 14, 2003 Applies to all Protected Health Information Included requirements for: Safeguards Notice of Privacy Practices Use and Disclosure of Protected Health Information Patient Rights Business Associates Other General Requirements HIPAA Privacy
April 14, 2005 Applies to Electronic Protected Health Information (EPHI) Included Requirements related to: Safeguards and protection of EPHI Device and Media Controls Contingency and Back Up Plan Individual Access to Information Information System Activity Review HIPAA Security
February 17, 2010 (with few exceptions) Applies to all protected health information Privacy and Security Provisions now apply to Business Associates Breach is Distinguished from a Violation Requirements of Notice of Breach Disclosures of Information to Payors Electronic Health Record Accounting and Access New Penalties Enforcement by State Attorney General Guidance from HHS HIPAA HITECH
“An unauthorized acquisition, access, use, or disclosure of phi which compromises the security or privacy of such information, except where an unauthorized person to whom such information is disclosed would not reasonably have been able to retain such information.” Exceptions  Clarifications from HHS HITECH- Definition of Breach
Step 1:  Was the Information Secure? Determination of Breach
Approved Methods: Encryption Destruction But NOT Access Controls Redaction Limited Data Set HITECH- Methods of Rendering PHI Unusable
Step 1:  Was the Information Secure? Step 2: Do One of the Exclusions Apply? Determination of Breach
Workforce Use – Unintentional acquisition, access or use of PHI by a workforce member if the PHI is not further used or disclosed in a manner that violates the Privacy Rule Workforce Disclosure - Unintentional disclosure of PHI by a workforce member if the PHI is not further used or disclosed in a manner that violates the Privacy Rule  No Way to Retain Info – Unauthorized disclosure to which the CE or BA has a good faith belief that the unauthorized person to whom the PHI is disclosed would not reasonably have been able to retain info. Exclusions to Breach
Step 1:  Was the Information Secure? Step 2: Do One of the Exclusions Apply? Step 3: Does the Use/Disclosure Pose a Significant Risk to the Individual? Determination of Breach
Covered Entity to Covered Entity – Inadvertent disclosure of PHI from one covered entity or BA employee to another similarly situated covered entity or BA employee, provided that PHI is not further used or disclosed in any manner that violates the Privacy Rule.  Immediate Steps to Mitigate– Were immediate steps taken to mitigate the harm including return or destruction of the information and a written confidentiality agreement Types of information included– Was the information disclosed limited to the name of the individual or a limited data set? Guidance for Significant Risk
Effective 9/23/09, but HHS will not impose sanctions until 2/22/10 Business Associate must notify Covered Entity of breach including individuals whose information was included in the breach Covered Entity has 60 days from the day discovered to notify the individual of a breach Day discovered is the date when provider knew or could have known through reasonable diligence Increases importance of system to check for breaches to phi and track compliance with HIPAA privacy and security regulations HITECH- Notice of Breach
Notice of Breach must include: A description of what happened including the date of breach and date of discovery A description of the types of phi involved Steps the individual should take to protect themselves Steps taken by the provider to investigate, mitigate, and protect against further disclosure Contact information for questions including a toll-free telephone number, e-mail address, website, or postal address HITECH- Notice of Breach
Notice must be provided to: Individual In writing to last known address Website If the provider does not have current contact information on more than 10 patients involved  Media If breach affected more than 500 patients in one state or jurisdiction Secretary of HHS Within 60 days if more than 500 people affected Annual report of breaches affecting less than 500 people HITECH- Notice of Breach
HIPAA Security Now Applies to Medical Records Increased Risk of Breach Importance of Monitoring Implementation and IT Considerations Impact of EMR Implementation
Safeguards and protection of EPH Perform a New Risk Assessment Physical Access to EPHI Encryption and Decryption of Data Tracking of Changes and Maintaining Integrity Remote Access Device and Media Control Use, Re-use, and Destruction New Concerns re: Copiers and Scan to E-mail EMR and HIPAA Security
Contingency and Back Up Plan New criticality analysis Redundancy and Back-Up Systems Emergency Mode and Recovery Operations Individual Access to Information Determination of Access Levels Granting, Modifying or Terminating Authority Protection of User Names and Passwords Automatic Log Off EMR and HIPAA Security
Information System Activity Review Review of log on attempts Audit logs Access reports Security incidents Other system activity EMR and HIPAA Security
More methods of access  Records more likely to leave the facility Increased transferability of information More interest in the information Greater impact if a breach occurs Increased Risk of Breach
Type of Entity with Breach over 500
Method of Breach
Location of Breach
Notice from the date you knew or should have known of the breach Increased penalties and scrutiny Failure to monitor can result in increased liability Renew the training for your staff and get them involved Importance of Monitoring
Incorporate the HIPAA discussion into your implementation plan Consider “upgrading” some of the hardware and other software options to improve encryption and security Security programs for handheld devices Implementation and IT Considerations
Created Framework for Communication Opt-In versus Opt-Out Specificity of Patient Consent Who is responsible for Security Modification of State privacy laws Current focus is at the state level Future amendments to HIPAA to encourage sharing of information? Considerations with EHR
Questions?? Stacy Harper, JD, MHSA, CPC Forbes Law Group, LLC 10740 Nall Avenue, Suite 330 Overland Park, KS 66211 (913) 641-8619 sharper@forbeslawgroup.com

More Related Content

What's hot

Group presentation hippa ppt
Group presentation hippa pptGroup presentation hippa ppt
Group presentation hippa pptMari Mina
 
Application Developers Guide to HIPAA Compliance
Application Developers Guide to HIPAA ComplianceApplication Developers Guide to HIPAA Compliance
Application Developers Guide to HIPAA ComplianceTrueVault
 
HIPPA Security Presentation
HIPPA Security PresentationHIPPA Security Presentation
HIPPA Security PresentationRebecca Norman
 
Hipaa journal com - HIPAA compliance guide
Hipaa journal com - HIPAA compliance guideHipaa journal com - HIPAA compliance guide
Hipaa journal com - HIPAA compliance guideFelipe Prado
 
Assessing Your Hosting Environment for HIPAA Compliance
Assessing Your Hosting Environment for HIPAA ComplianceAssessing Your Hosting Environment for HIPAA Compliance
Assessing Your Hosting Environment for HIPAA ComplianceHostway|HOSTING
 
Hipaa and him security brunelle
Hipaa and him security brunelleHipaa and him security brunelle
Hipaa and him security brunellesjbusnpa
 
HIPAA Part I the Law Test
HIPAA Part I  the Law TestHIPAA Part I  the Law Test
HIPAA Part I the Law TestSachiko Hurst
 
Privacy and confidentiality
Privacy and confidentialityPrivacy and confidentiality
Privacy and confidentialityscarollo
 
HIPAA Compliance for Developers
HIPAA Compliance for DevelopersHIPAA Compliance for Developers
HIPAA Compliance for DevelopersTrueVault
 
The HIPAA Security Rule: Yes, It's Your Problem
The HIPAA Security Rule: Yes, It's Your ProblemThe HIPAA Security Rule: Yes, It's Your Problem
The HIPAA Security Rule: Yes, It's Your ProblemSecurityMetrics
 
Brian Balow HIPAA Final Rule
Brian Balow HIPAA Final RuleBrian Balow HIPAA Final Rule
Brian Balow HIPAA Final Rulemihinpr
 
Week 1 discussion 2 confidentiality final
Week 1 discussion 2 confidentiality finalWeek 1 discussion 2 confidentiality final
Week 1 discussion 2 confidentiality finalLucy Lacy
 
HIPAA HiTech Security Assessment
HIPAA HiTech Security AssessmentHIPAA HiTech Security Assessment
HIPAA HiTech Security Assessmentdata brackets
 
You and HIPAA - Get the Facts
You and HIPAA - Get the FactsYou and HIPAA - Get the Facts
You and HIPAA - Get the Factsresourceone
 
HIPAA - Understanding the Basics of Compliance
HIPAA - Understanding the Basics of ComplianceHIPAA - Understanding the Basics of Compliance
HIPAA - Understanding the Basics of ComplianceJay Hodes
 
Hippa final JU nursing informatics
Hippa final JU nursing informaticsHippa final JU nursing informatics
Hippa final JU nursing informaticskmcanty
 
A brief introduction to hipaa compliance
A brief introduction to hipaa complianceA brief introduction to hipaa compliance
A brief introduction to hipaa compliancePrince George
 

What's hot (20)

Group presentation hippa ppt
Group presentation hippa pptGroup presentation hippa ppt
Group presentation hippa ppt
 
Application Developers Guide to HIPAA Compliance
Application Developers Guide to HIPAA ComplianceApplication Developers Guide to HIPAA Compliance
Application Developers Guide to HIPAA Compliance
 
HIPPA Security Presentation
HIPPA Security PresentationHIPPA Security Presentation
HIPPA Security Presentation
 
Hipaa journal com - HIPAA compliance guide
Hipaa journal com - HIPAA compliance guideHipaa journal com - HIPAA compliance guide
Hipaa journal com - HIPAA compliance guide
 
Assessing Your Hosting Environment for HIPAA Compliance
Assessing Your Hosting Environment for HIPAA ComplianceAssessing Your Hosting Environment for HIPAA Compliance
Assessing Your Hosting Environment for HIPAA Compliance
 
HIPAA and How it Applies to You
HIPAA and How it Applies to YouHIPAA and How it Applies to You
HIPAA and How it Applies to You
 
Hipaa and him security brunelle
Hipaa and him security brunelleHipaa and him security brunelle
Hipaa and him security brunelle
 
HIPAA Part I the Law Test
HIPAA Part I  the Law TestHIPAA Part I  the Law Test
HIPAA Part I the Law Test
 
Privacy and confidentiality
Privacy and confidentialityPrivacy and confidentiality
Privacy and confidentiality
 
HIPAA Compliance for Developers
HIPAA Compliance for DevelopersHIPAA Compliance for Developers
HIPAA Compliance for Developers
 
Blodgett MHA 690 W1 D2
Blodgett MHA 690 W1 D2Blodgett MHA 690 W1 D2
Blodgett MHA 690 W1 D2
 
The HIPAA Security Rule: Yes, It's Your Problem
The HIPAA Security Rule: Yes, It's Your ProblemThe HIPAA Security Rule: Yes, It's Your Problem
The HIPAA Security Rule: Yes, It's Your Problem
 
Brian Balow HIPAA Final Rule
Brian Balow HIPAA Final RuleBrian Balow HIPAA Final Rule
Brian Balow HIPAA Final Rule
 
Week 1 discussion 2 confidentiality final
Week 1 discussion 2 confidentiality finalWeek 1 discussion 2 confidentiality final
Week 1 discussion 2 confidentiality final
 
HIPAA HiTech Security Assessment
HIPAA HiTech Security AssessmentHIPAA HiTech Security Assessment
HIPAA HiTech Security Assessment
 
You and HIPAA - Get the Facts
You and HIPAA - Get the FactsYou and HIPAA - Get the Facts
You and HIPAA - Get the Facts
 
HIPAA - Understanding the Basics of Compliance
HIPAA - Understanding the Basics of ComplianceHIPAA - Understanding the Basics of Compliance
HIPAA - Understanding the Basics of Compliance
 
Hippa final JU nursing informatics
Hippa final JU nursing informaticsHippa final JU nursing informatics
Hippa final JU nursing informatics
 
A brief introduction to hipaa compliance
A brief introduction to hipaa complianceA brief introduction to hipaa compliance
A brief introduction to hipaa compliance
 
HIPAA Complaince
HIPAA ComplainceHIPAA Complaince
HIPAA Complaince
 

Viewers also liked

Path To Meaningful Use
Path To Meaningful UsePath To Meaningful Use
Path To Meaningful Usekerbertx
 
The Path to Clinical Groupware. by Vince Kuraitis
The Path to Clinical Groupware. by Vince KuraitisThe Path to Clinical Groupware. by Vince Kuraitis
The Path to Clinical Groupware. by Vince KuraitisHealth 2.0
 
Eliminate the Chaos: Myth #1 to Avoid in Your EHR Migration
 Eliminate the Chaos: Myth #1 to Avoid in Your EHR Migration Eliminate the Chaos: Myth #1 to Avoid in Your EHR Migration
Eliminate the Chaos: Myth #1 to Avoid in Your EHR MigrationBoston Software Systems
 
Eliminate the Chaos: Myth #4 to Avoid in Your EHR Migration
 Eliminate the Chaos: Myth #4 to Avoid in Your EHR Migration Eliminate the Chaos: Myth #4 to Avoid in Your EHR Migration
Eliminate the Chaos: Myth #4 to Avoid in Your EHR MigrationBoston Software Systems
 
Upgrade Your EHR - Switch Checklist Whitepaper
Upgrade Your EHR - Switch Checklist WhitepaperUpgrade Your EHR - Switch Checklist Whitepaper
Upgrade Your EHR - Switch Checklist Whitepaperdrchrono
 
MCE GeoProcessing Services for ADM(IE): Self Validation of Spatial Data Input...
MCE GeoProcessing Services for ADM(IE): Self Validation of Spatial Data Input...MCE GeoProcessing Services for ADM(IE): Self Validation of Spatial Data Input...
MCE GeoProcessing Services for ADM(IE): Self Validation of Spatial Data Input...Safe Software
 
ARRA EHR Presentation Austin - GCS Technologies
ARRA EHR Presentation Austin - GCS TechnologiesARRA EHR Presentation Austin - GCS Technologies
ARRA EHR Presentation Austin - GCS Technologiescrashutah
 
Batch and Real-time EHR updates into Hadoop - StampedeCon 2015
Batch and Real-time EHR updates into Hadoop - StampedeCon 2015Batch and Real-time EHR updates into Hadoop - StampedeCon 2015
Batch and Real-time EHR updates into Hadoop - StampedeCon 2015StampedeCon
 
EMR, EHR and Meaningful Use Presentation
EMR, EHR and Meaningful Use PresentationEMR, EHR and Meaningful Use Presentation
EMR, EHR and Meaningful Use Presentationcrashutah
 
Research and Development
Research and DevelopmentResearch and Development
Research and DevelopmentShameem Ali
 

Viewers also liked (12)

Path To Meaningful Use
Path To Meaningful UsePath To Meaningful Use
Path To Meaningful Use
 
The Path to Clinical Groupware. by Vince Kuraitis
The Path to Clinical Groupware. by Vince KuraitisThe Path to Clinical Groupware. by Vince Kuraitis
The Path to Clinical Groupware. by Vince Kuraitis
 
Eliminate the Chaos: Myth #1 to Avoid in Your EHR Migration
 Eliminate the Chaos: Myth #1 to Avoid in Your EHR Migration Eliminate the Chaos: Myth #1 to Avoid in Your EHR Migration
Eliminate the Chaos: Myth #1 to Avoid in Your EHR Migration
 
Eliminate the Chaos: Myth #4 to Avoid in Your EHR Migration
 Eliminate the Chaos: Myth #4 to Avoid in Your EHR Migration Eliminate the Chaos: Myth #4 to Avoid in Your EHR Migration
Eliminate the Chaos: Myth #4 to Avoid in Your EHR Migration
 
Upgrade Your EHR - Switch Checklist Whitepaper
Upgrade Your EHR - Switch Checklist WhitepaperUpgrade Your EHR - Switch Checklist Whitepaper
Upgrade Your EHR - Switch Checklist Whitepaper
 
MCE GeoProcessing Services for ADM(IE): Self Validation of Spatial Data Input...
MCE GeoProcessing Services for ADM(IE): Self Validation of Spatial Data Input...MCE GeoProcessing Services for ADM(IE): Self Validation of Spatial Data Input...
MCE GeoProcessing Services for ADM(IE): Self Validation of Spatial Data Input...
 
ARRA EHR Presentation Austin - GCS Technologies
ARRA EHR Presentation Austin - GCS TechnologiesARRA EHR Presentation Austin - GCS Technologies
ARRA EHR Presentation Austin - GCS Technologies
 
Batch and Real-time EHR updates into Hadoop - StampedeCon 2015
Batch and Real-time EHR updates into Hadoop - StampedeCon 2015Batch and Real-time EHR updates into Hadoop - StampedeCon 2015
Batch and Real-time EHR updates into Hadoop - StampedeCon 2015
 
E-health in Denmark
E-health in DenmarkE-health in Denmark
E-health in Denmark
 
EMR, EHR and Meaningful Use Presentation
EMR, EHR and Meaningful Use PresentationEMR, EHR and Meaningful Use Presentation
EMR, EHR and Meaningful Use Presentation
 
EHR & Healthcare
EHR & HealthcareEHR & Healthcare
EHR & Healthcare
 
Research and Development
Research and DevelopmentResearch and Development
Research and Development
 

Similar to Hipaa in the era of ehr mo dept hss

HIPAA Compliance For Small Practices
HIPAA Compliance For Small PracticesHIPAA Compliance For Small Practices
HIPAA Compliance For Small PracticesNisos Health
 
Chapter 5HIPAA and HITECHLearning ObjectivesUnde
Chapter 5HIPAA and HITECHLearning ObjectivesUndeChapter 5HIPAA and HITECHLearning ObjectivesUnde
Chapter 5HIPAA and HITECHLearning ObjectivesUndeWilheminaRossi174
 
Training on confidentiality MHA690 Hayden
Training on confidentiality MHA690 HaydenTraining on confidentiality MHA690 Hayden
Training on confidentiality MHA690 Haydenhaydens
 
Dental Compliance for Dentists and Business Associates
Dental Compliance for Dentists and Business AssociatesDental Compliance for Dentists and Business Associates
Dental Compliance for Dentists and Business Associatesgppcpa
 
Role-Based Access Governance and HIPAA Compliance: A Pragmatic Approach
Role-Based Access Governance and HIPAA Compliance: A Pragmatic ApproachRole-Based Access Governance and HIPAA Compliance: A Pragmatic Approach
Role-Based Access Governance and HIPAA Compliance: A Pragmatic ApproachEMC
 
Legal, Ethical & Social Issues
Legal, Ethical & Social IssuesLegal, Ethical & Social Issues
Legal, Ethical & Social Issuesckrampert
 
HIPAA Final Omnibus Rule Playbook
HIPAA Final Omnibus Rule PlaybookHIPAA Final Omnibus Rule Playbook
HIPAA Final Omnibus Rule PlaybookElizabeth Dimit
 
Hi paa and eh rs
Hi paa and eh rsHi paa and eh rs
Hi paa and eh rssupportc2go
 
Patient confidentiality training
Patient confidentiality trainingPatient confidentiality training
Patient confidentiality trainingSheena705
 
how to really implement hipaa presentation
how to really implement hipaa presentationhow to really implement hipaa presentation
how to really implement hipaa presentationProvider Resources Group
 
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...M2SYS Technology
 
Week 1 discussion 2 confidentiality
Week 1 discussion 2 confidentialityWeek 1 discussion 2 confidentiality
Week 1 discussion 2 confidentialityLucy Lacy
 
Week 1 discussion 2 confidentiality
Week 1 discussion 2 confidentialityWeek 1 discussion 2 confidentiality
Week 1 discussion 2 confidentialityLucy Lacy
 
health insurance portability and accountability act.pptx
health insurance portability and accountability act.pptxhealth insurance portability and accountability act.pptx
health insurance portability and accountability act.pptxamartya2087
 
Hi paa and eh rs
Hi paa and eh rsHi paa and eh rs
Hi paa and eh rssupportc2go
 

Similar to Hipaa in the era of ehr mo dept hss (20)

HIPAA Compliance For Small Practices
HIPAA Compliance For Small PracticesHIPAA Compliance For Small Practices
HIPAA Compliance For Small Practices
 
HIPAA
HIPAAHIPAA
HIPAA
 
Healthcare and Cyber security
Healthcare and Cyber securityHealthcare and Cyber security
Healthcare and Cyber security
 
Chapter 5HIPAA and HITECHLearning ObjectivesUnde
Chapter 5HIPAA and HITECHLearning ObjectivesUndeChapter 5HIPAA and HITECHLearning ObjectivesUnde
Chapter 5HIPAA and HITECHLearning ObjectivesUnde
 
Training on confidentiality MHA690 Hayden
Training on confidentiality MHA690 HaydenTraining on confidentiality MHA690 Hayden
Training on confidentiality MHA690 Hayden
 
Dental Compliance for Dentists and Business Associates
Dental Compliance for Dentists and Business AssociatesDental Compliance for Dentists and Business Associates
Dental Compliance for Dentists and Business Associates
 
Role-Based Access Governance and HIPAA Compliance: A Pragmatic Approach
Role-Based Access Governance and HIPAA Compliance: A Pragmatic ApproachRole-Based Access Governance and HIPAA Compliance: A Pragmatic Approach
Role-Based Access Governance and HIPAA Compliance: A Pragmatic Approach
 
Legal, Ethical & Social Issues
Legal, Ethical & Social IssuesLegal, Ethical & Social Issues
Legal, Ethical & Social Issues
 
HIPAA Final Omnibus Rule Playbook
HIPAA Final Omnibus Rule PlaybookHIPAA Final Omnibus Rule Playbook
HIPAA Final Omnibus Rule Playbook
 
Hi paa and eh rs
Hi paa and eh rsHi paa and eh rs
Hi paa and eh rs
 
Patient confidentiality training
Patient confidentiality trainingPatient confidentiality training
Patient confidentiality training
 
how to really implement hipaa presentation
how to really implement hipaa presentationhow to really implement hipaa presentation
how to really implement hipaa presentation
 
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Week 1 discussion 2 confidentiality
Week 1 discussion 2 confidentialityWeek 1 discussion 2 confidentiality
Week 1 discussion 2 confidentiality
 
Week 1 discussion 2 confidentiality
Week 1 discussion 2 confidentialityWeek 1 discussion 2 confidentiality
Week 1 discussion 2 confidentiality
 
health insurance portability and accountability act.pptx
health insurance portability and accountability act.pptxhealth insurance portability and accountability act.pptx
health insurance portability and accountability act.pptx
 
Hi paa and eh rs
Hi paa and eh rsHi paa and eh rs
Hi paa and eh rs
 
Confidentiality, HIPAA and HITECH
Confidentiality, HIPAA and HITECHConfidentiality, HIPAA and HITECH
Confidentiality, HIPAA and HITECH
 
HIPAA TITLE II (2)
HIPAA TITLE II (2)HIPAA TITLE II (2)
HIPAA TITLE II (2)
 

More from learfield

Ctf presentation 5 8-13
Ctf presentation 5 8-13Ctf presentation 5 8-13
Ctf presentation 5 8-13learfield
 
Education training 2012
Education training 2012Education training 2012
Education training 2012learfield
 
The Basics of Security and Risk Analysis
The Basics of Security and Risk AnalysisThe Basics of Security and Risk Analysis
The Basics of Security and Risk Analysislearfield
 
Allabout interaction
Allabout interactionAllabout interaction
Allabout interactionlearfield
 
1 proposal mohealthybirths
1 proposal mohealthybirths1 proposal mohealthybirths
1 proposal mohealthybirthslearfield
 
ABCs of Million Hearts in Missouri by Dr. Janet Wright
ABCs of Million Hearts in Missouri by Dr. Janet WrightABCs of Million Hearts in Missouri by Dr. Janet Wright
ABCs of Million Hearts in Missouri by Dr. Janet Wrightlearfield
 
Missouri Sustainability Toolkit
Missouri Sustainability ToolkitMissouri Sustainability Toolkit
Missouri Sustainability Toolkitlearfield
 
InterAction Portfolio
InterAction Portfolio InterAction Portfolio
InterAction Portfolio learfield
 
RN-BSN Rural Nurse Initiative for Missouri
RN-BSN Rural Nurse Initiative for Missouri RN-BSN Rural Nurse Initiative for Missouri
RN-BSN Rural Nurse Initiative for Missouri learfield
 
MBQIP 2011 Missouri
MBQIP 2011 Missouri MBQIP 2011 Missouri
MBQIP 2011 Missouri learfield
 
Welcome to Grant Writing Basics
Welcome to Grant Writing Basics Welcome to Grant Writing Basics
Welcome to Grant Writing Basics learfield
 
Those Who Lead for RHC
Those Who Lead for RHCThose Who Lead for RHC
Those Who Lead for RHClearfield
 
Biographical Sketches
Biographical SketchesBiographical Sketches
Biographical Sketcheslearfield
 
Electronic Medication Reconciliation
Electronic Medication Reconciliation Electronic Medication Reconciliation
Electronic Medication Reconciliation learfield
 
Implementing Electronic Medical Records
Implementing Electronic Medical RecordsImplementing Electronic Medical Records
Implementing Electronic Medical Recordslearfield
 
HIT Network Readiness Assessment
HIT Network Readiness AssessmentHIT Network Readiness Assessment
HIT Network Readiness Assessmentlearfield
 
MO HIT Assistance Center Rural Hospital presentation
MO HIT Assistance Center Rural Hospital presentationMO HIT Assistance Center Rural Hospital presentation
MO HIT Assistance Center Rural Hospital presentationlearfield
 
SCIP HF Results
SCIP HF ResultsSCIP HF Results
SCIP HF Resultslearfield
 
CMH Medication Reconciliation Journey 2011
CMH  Medication Reconciliation Journey 2011CMH  Medication Reconciliation Journey 2011
CMH Medication Reconciliation Journey 2011learfield
 
CMH Medication Reconciliation Journey 2011
CMH Medication Reconciliation Journey 2011CMH Medication Reconciliation Journey 2011
CMH Medication Reconciliation Journey 2011learfield
 

More from learfield (20)

Ctf presentation 5 8-13
Ctf presentation 5 8-13Ctf presentation 5 8-13
Ctf presentation 5 8-13
 
Education training 2012
Education training 2012Education training 2012
Education training 2012
 
The Basics of Security and Risk Analysis
The Basics of Security and Risk AnalysisThe Basics of Security and Risk Analysis
The Basics of Security and Risk Analysis
 
Allabout interaction
Allabout interactionAllabout interaction
Allabout interaction
 
1 proposal mohealthybirths
1 proposal mohealthybirths1 proposal mohealthybirths
1 proposal mohealthybirths
 
ABCs of Million Hearts in Missouri by Dr. Janet Wright
ABCs of Million Hearts in Missouri by Dr. Janet WrightABCs of Million Hearts in Missouri by Dr. Janet Wright
ABCs of Million Hearts in Missouri by Dr. Janet Wright
 
Missouri Sustainability Toolkit
Missouri Sustainability ToolkitMissouri Sustainability Toolkit
Missouri Sustainability Toolkit
 
InterAction Portfolio
InterAction Portfolio InterAction Portfolio
InterAction Portfolio
 
RN-BSN Rural Nurse Initiative for Missouri
RN-BSN Rural Nurse Initiative for Missouri RN-BSN Rural Nurse Initiative for Missouri
RN-BSN Rural Nurse Initiative for Missouri
 
MBQIP 2011 Missouri
MBQIP 2011 Missouri MBQIP 2011 Missouri
MBQIP 2011 Missouri
 
Welcome to Grant Writing Basics
Welcome to Grant Writing Basics Welcome to Grant Writing Basics
Welcome to Grant Writing Basics
 
Those Who Lead for RHC
Those Who Lead for RHCThose Who Lead for RHC
Those Who Lead for RHC
 
Biographical Sketches
Biographical SketchesBiographical Sketches
Biographical Sketches
 
Electronic Medication Reconciliation
Electronic Medication Reconciliation Electronic Medication Reconciliation
Electronic Medication Reconciliation
 
Implementing Electronic Medical Records
Implementing Electronic Medical RecordsImplementing Electronic Medical Records
Implementing Electronic Medical Records
 
HIT Network Readiness Assessment
HIT Network Readiness AssessmentHIT Network Readiness Assessment
HIT Network Readiness Assessment
 
MO HIT Assistance Center Rural Hospital presentation
MO HIT Assistance Center Rural Hospital presentationMO HIT Assistance Center Rural Hospital presentation
MO HIT Assistance Center Rural Hospital presentation
 
SCIP HF Results
SCIP HF ResultsSCIP HF Results
SCIP HF Results
 
CMH Medication Reconciliation Journey 2011
CMH  Medication Reconciliation Journey 2011CMH  Medication Reconciliation Journey 2011
CMH Medication Reconciliation Journey 2011
 
CMH Medication Reconciliation Journey 2011
CMH Medication Reconciliation Journey 2011CMH Medication Reconciliation Journey 2011
CMH Medication Reconciliation Journey 2011
 

Recently uploaded

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 

Recently uploaded (20)

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 

Hipaa in the era of ehr mo dept hss

  • 1. HIPAA in the Era of EHR Rural Hospital Health Information Technology Conference May 27, 2010 Stacy Harper, JD, MHSA, CPC Forbes Law Group, LLC (913) 341 – 8619 sharper@forbeslawgroup.com
  • 2. Summary of HIPAA to Date Impact of EMR Implementation Considerations with EHR Overview
  • 3. Administrative Simplification Privacy Security HITECH Summary of HIPAA To Date
  • 4. Standardized Electronic Transactions and Code Sets Unique Identifier for Employers Unique Identifier for Providers Unique Identifier for Health Plans HIPAA Administrative Simplification
  • 5. April 14, 2003 Applies to all Protected Health Information Included requirements for: Safeguards Notice of Privacy Practices Use and Disclosure of Protected Health Information Patient Rights Business Associates Other General Requirements HIPAA Privacy
  • 6. April 14, 2005 Applies to Electronic Protected Health Information (EPHI) Included Requirements related to: Safeguards and protection of EPHI Device and Media Controls Contingency and Back Up Plan Individual Access to Information Information System Activity Review HIPAA Security
  • 7. February 17, 2010 (with few exceptions) Applies to all protected health information Privacy and Security Provisions now apply to Business Associates Breach is Distinguished from a Violation Requirements of Notice of Breach Disclosures of Information to Payors Electronic Health Record Accounting and Access New Penalties Enforcement by State Attorney General Guidance from HHS HIPAA HITECH
  • 8. “An unauthorized acquisition, access, use, or disclosure of phi which compromises the security or privacy of such information, except where an unauthorized person to whom such information is disclosed would not reasonably have been able to retain such information.” Exceptions Clarifications from HHS HITECH- Definition of Breach
  • 9. Step 1: Was the Information Secure? Determination of Breach
  • 10. Approved Methods: Encryption Destruction But NOT Access Controls Redaction Limited Data Set HITECH- Methods of Rendering PHI Unusable
  • 11. Step 1: Was the Information Secure? Step 2: Do One of the Exclusions Apply? Determination of Breach
  • 12. Workforce Use – Unintentional acquisition, access or use of PHI by a workforce member if the PHI is not further used or disclosed in a manner that violates the Privacy Rule Workforce Disclosure - Unintentional disclosure of PHI by a workforce member if the PHI is not further used or disclosed in a manner that violates the Privacy Rule No Way to Retain Info – Unauthorized disclosure to which the CE or BA has a good faith belief that the unauthorized person to whom the PHI is disclosed would not reasonably have been able to retain info. Exclusions to Breach
  • 13. Step 1: Was the Information Secure? Step 2: Do One of the Exclusions Apply? Step 3: Does the Use/Disclosure Pose a Significant Risk to the Individual? Determination of Breach
  • 14. Covered Entity to Covered Entity – Inadvertent disclosure of PHI from one covered entity or BA employee to another similarly situated covered entity or BA employee, provided that PHI is not further used or disclosed in any manner that violates the Privacy Rule. Immediate Steps to Mitigate– Were immediate steps taken to mitigate the harm including return or destruction of the information and a written confidentiality agreement Types of information included– Was the information disclosed limited to the name of the individual or a limited data set? Guidance for Significant Risk
  • 15. Effective 9/23/09, but HHS will not impose sanctions until 2/22/10 Business Associate must notify Covered Entity of breach including individuals whose information was included in the breach Covered Entity has 60 days from the day discovered to notify the individual of a breach Day discovered is the date when provider knew or could have known through reasonable diligence Increases importance of system to check for breaches to phi and track compliance with HIPAA privacy and security regulations HITECH- Notice of Breach
  • 16. Notice of Breach must include: A description of what happened including the date of breach and date of discovery A description of the types of phi involved Steps the individual should take to protect themselves Steps taken by the provider to investigate, mitigate, and protect against further disclosure Contact information for questions including a toll-free telephone number, e-mail address, website, or postal address HITECH- Notice of Breach
  • 17. Notice must be provided to: Individual In writing to last known address Website If the provider does not have current contact information on more than 10 patients involved Media If breach affected more than 500 patients in one state or jurisdiction Secretary of HHS Within 60 days if more than 500 people affected Annual report of breaches affecting less than 500 people HITECH- Notice of Breach
  • 18. HIPAA Security Now Applies to Medical Records Increased Risk of Breach Importance of Monitoring Implementation and IT Considerations Impact of EMR Implementation
  • 19. Safeguards and protection of EPH Perform a New Risk Assessment Physical Access to EPHI Encryption and Decryption of Data Tracking of Changes and Maintaining Integrity Remote Access Device and Media Control Use, Re-use, and Destruction New Concerns re: Copiers and Scan to E-mail EMR and HIPAA Security
  • 20. Contingency and Back Up Plan New criticality analysis Redundancy and Back-Up Systems Emergency Mode and Recovery Operations Individual Access to Information Determination of Access Levels Granting, Modifying or Terminating Authority Protection of User Names and Passwords Automatic Log Off EMR and HIPAA Security
  • 21. Information System Activity Review Review of log on attempts Audit logs Access reports Security incidents Other system activity EMR and HIPAA Security
  • 22. More methods of access Records more likely to leave the facility Increased transferability of information More interest in the information Greater impact if a breach occurs Increased Risk of Breach
  • 23. Type of Entity with Breach over 500
  • 26. Notice from the date you knew or should have known of the breach Increased penalties and scrutiny Failure to monitor can result in increased liability Renew the training for your staff and get them involved Importance of Monitoring
  • 27. Incorporate the HIPAA discussion into your implementation plan Consider “upgrading” some of the hardware and other software options to improve encryption and security Security programs for handheld devices Implementation and IT Considerations
  • 28. Created Framework for Communication Opt-In versus Opt-Out Specificity of Patient Consent Who is responsible for Security Modification of State privacy laws Current focus is at the state level Future amendments to HIPAA to encourage sharing of information? Considerations with EHR
  • 29. Questions?? Stacy Harper, JD, MHSA, CPC Forbes Law Group, LLC 10740 Nall Avenue, Suite 330 Overland Park, KS 66211 (913) 641-8619 sharper@forbeslawgroup.com