SlideShare una empresa de Scribd logo
1 de 16
HIPAA & HITECH
HIPAA
• Has been a federal privacy regulation since
  2003. Covers privacy and security of health
  information.
• Reviewed in annual education
• Taught in new employee orientation
• The facility Security Officer is Christie
  Messinger
• The facility Privacy Officer is Alane Bryan
HITECH
•   Does not replace HIPAA—it gives it TEETH!
•   Requires a breach notification policy
•   Encourages EHR adoption
•   Provides strict data protection regulations for
    more secure patient privacy
New Fines as of March 26, 2013
Violation Type                    Each Violation      Repeat Violations/Yr.
Did not know                      $100 - $50,000      $1.5 million
Reasonable Cause                  $1,000 - $50,000    $1.5 million
Willful Neglect – Corrected       $10,000 - $50,000   $1.5 million
Willful Neglect – Not Corrected   $50,000             $1.5 million


 •Healthcare organizations or providers may be held liable for
 violations.
 •Individual employees may be prosecuted or may be sued for
 civil penalties.
Breach Notifications
 Must notify individuals and HHS and, in some
  cases the media, of any substantiated
  breaches within 60 days.
 Breaches affecting 500 or more patients will
  be posted to the HHS.gov website.
Documented Breaches
•   Mass General
•   California Breaches
•   BCBS of TN Breach
•   Individual Prosecution
•   Personal Gain
Top Privacy Violations
•   Stolen laptops/computers
•   Lost CDs
•   ID theft/Social Security Numbers
•   Medicare Fraud
•   Access to EMR with no job-related need
Privacy Breach Examples
• Using Social Networking to talk about patients
• Discussing PHI with employees or family who
  do not have a job-related need
• Looking at EMR out of concern or curiosity
• Telling others that a patient was “in” for
  treatment
• Discussing progress or prognosis in front of
  family without permission
More Privacy Breach Examples
• Using chart to get information to use against
    patient in lawsuit or divorce
•   Looking in minor child’s EMR
•   Taking a peek for “educational purposes”
•   Starting conversations with “Don’t tell anyone
    I told you this, but…”
•   Sharing computer access/passwords
Permitted HIPAA Exceptions
•   Treatment, Payment, Operations
•   Some law enforcement exceptions
•   Public health reporting
•   When in doubt, get a Signed Release
•   Disclose “minimal necessary” amount of PHI
HIPAA, HITECH, & YOU
• Patients/family members requesting patient
  information AFTER DISCHARGE should be
  referred to the HIM Department
• If a patient requests information during an
  admission, make sure the report is FINAL before
  giving the information to the patient or to their
  designee (document the designee). We do not
  release information unless it is in a FINAL status.
• Discuss patient information as quietly as possible
HIPAA, HITECH, & YOU
•   Try not to say the patient’s name repeatedly
•   Make sure paper containing PHI makes it to a shred bin
•   Shred bins should be dumped in large bins each day
•   Use fax cover sheets with the confidentiality clause
•   Do not leave messages with too much information
•   Wear your employee ID badge at all times
HIPAA, HITECH, & YOU
• Use workstations for intended purposes
  – No gaming, no unauthorized downloading of files,
    personal emails are subject to access by P & S
    Surgical Hospital
• Log-off or lock your computer when you are
  not using it
• Make sure others cannot view your computer
  screen
HIPAA, HITECH, & YOU
• Keep passwords secure
• Use your own individual password
• Avoid sharing passwords
• Trigger encryption for emails containing PHI
  being sent outside the organization
• If photos must be taken of a patient, use a
  P & S camera or device; NEVER use your
  personal camera or smart phone
HIPAA, HITECH, & YOU
• Never share proprietary or confidential
  information in blogs or on social media sites
• Report potential breaches, inappropriate
  disclosures, or otherwise suspect behavior to
  your direct supervisor, the Privacy Officer, the
  Security Officer, or the Corporate Compliance
  Officer
End of Presentation
• This is the end of presentation. Click on blue
  Quiz button next.

Más contenido relacionado

La actualidad más candente

Confidentiality slide
Confidentiality slideConfidentiality slide
Confidentiality slidewongy12
 
Tiffany hall mha 690 week 1 discussion 2
Tiffany hall mha 690 week 1   discussion 2Tiffany hall mha 690 week 1   discussion 2
Tiffany hall mha 690 week 1 discussion 2tiffhall
 
Confidentiality
ConfidentialityConfidentiality
ConfidentialityKim Rogers
 
Ruggiero.hipaa training
Ruggiero.hipaa trainingRuggiero.hipaa training
Ruggiero.hipaa trainingGina Ruggiero
 
Welcome to the hippa, privacy and security
Welcome to the hippa, privacy and securityWelcome to the hippa, privacy and security
Welcome to the hippa, privacy and securityveve1728
 
HIPAA and Privacy Training
HIPAA and Privacy TrainingHIPAA and Privacy Training
HIPAA and Privacy TrainingJasAmataga
 
Patient confidentiality.ppt
Patient confidentiality.pptPatient confidentiality.ppt
Patient confidentiality.pptchwiso8418
 
MHA690 confidentiality training
MHA690 confidentiality trainingMHA690 confidentiality training
MHA690 confidentiality trainingsdavis49
 
Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentialitychwiso8418
 
Confidentiality
ConfidentialityConfidentiality
Confidentialityslinkous
 

La actualidad más candente (17)

Hipaa 1
Hipaa 1Hipaa 1
Hipaa 1
 
Confidentiality slide
Confidentiality slideConfidentiality slide
Confidentiality slide
 
Mha690 w1 d2
Mha690 w1 d2Mha690 w1 d2
Mha690 w1 d2
 
Tiffany hall mha 690 week 1 discussion 2
Tiffany hall mha 690 week 1   discussion 2Tiffany hall mha 690 week 1   discussion 2
Tiffany hall mha 690 week 1 discussion 2
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Hippa presentation2
Hippa presentation2Hippa presentation2
Hippa presentation2
 
Ruggiero.hipaa training
Ruggiero.hipaa trainingRuggiero.hipaa training
Ruggiero.hipaa training
 
Hippa training 2017
Hippa training 2017Hippa training 2017
Hippa training 2017
 
Welcome to the hippa, privacy and security
Welcome to the hippa, privacy and securityWelcome to the hippa, privacy and security
Welcome to the hippa, privacy and security
 
HIPAA and Privacy Training
HIPAA and Privacy TrainingHIPAA and Privacy Training
HIPAA and Privacy Training
 
Hippa
HippaHippa
Hippa
 
Patient confidentiality.ppt
Patient confidentiality.pptPatient confidentiality.ppt
Patient confidentiality.ppt
 
Hippa 2021
Hippa 2021Hippa 2021
Hippa 2021
 
MHA690 confidentiality training
MHA690 confidentiality trainingMHA690 confidentiality training
MHA690 confidentiality training
 
Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentiality
 
Hippa
HippaHippa
Hippa
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 

Destacado

Quality improvement 2015
Quality improvement 2015Quality improvement 2015
Quality improvement 2015pssurgery
 
Quality Assurancev and improvement guide
Quality Assurancev and improvement guideQuality Assurancev and improvement guide
Quality Assurancev and improvement guideFisseha Eshete
 
Jci mentoring program
Jci mentoring programJci mentoring program
Jci mentoring programnstoll
 
Project Management Class ( based on PMBOK) - Day 4
Project Management Class ( based on PMBOK) - Day 4Project Management Class ( based on PMBOK) - Day 4
Project Management Class ( based on PMBOK) - Day 4Highmark Health
 
Lecture2 introduction-to-medical-ethics(29.09.16)
Lecture2 introduction-to-medical-ethics(29.09.16)Lecture2 introduction-to-medical-ethics(29.09.16)
Lecture2 introduction-to-medical-ethics(29.09.16)Dr Ghaiath Hussein
 
Introduction to medical ethics
Introduction to medical ethics	Introduction to medical ethics
Introduction to medical ethics Khalid
 

Destacado (8)

Quality improvement 2015
Quality improvement 2015Quality improvement 2015
Quality improvement 2015
 
Quality Assurancev and improvement guide
Quality Assurancev and improvement guideQuality Assurancev and improvement guide
Quality Assurancev and improvement guide
 
MEDICAL ETHICS IN RESEARCH PROPOSALS ( Indian contest )
MEDICAL ETHICS INRESEARCH PROPOSALS  ( Indian contest )    MEDICAL ETHICS INRESEARCH PROPOSALS  ( Indian contest )
MEDICAL ETHICS IN RESEARCH PROPOSALS ( Indian contest )
 
Jci mentoring program
Jci mentoring programJci mentoring program
Jci mentoring program
 
Project Management Class ( based on PMBOK) - Day 4
Project Management Class ( based on PMBOK) - Day 4Project Management Class ( based on PMBOK) - Day 4
Project Management Class ( based on PMBOK) - Day 4
 
Lecture2 introduction-to-medical-ethics(29.09.16)
Lecture2 introduction-to-medical-ethics(29.09.16)Lecture2 introduction-to-medical-ethics(29.09.16)
Lecture2 introduction-to-medical-ethics(29.09.16)
 
JCIA PRESENTATION
JCIA PRESENTATIONJCIA PRESENTATION
JCIA PRESENTATION
 
Introduction to medical ethics
Introduction to medical ethics	Introduction to medical ethics
Introduction to medical ethics
 

Similar a Hipaa

Are You HIPAA Safe?
Are You HIPAA Safe?Are You HIPAA Safe?
Are You HIPAA Safe?TriageLogic
 
Annual HIPAA Education
Annual HIPAA EducationAnnual HIPAA Education
Annual HIPAA EducationDirkRhodes
 
Patient privacy and confidentiality training
Patient privacy and confidentiality trainingPatient privacy and confidentiality training
Patient privacy and confidentiality trainingtlprobinson
 
Rems hipaa
Rems hipaaRems hipaa
Rems hipaadhexel
 
Patient confidentiality power point
Patient confidentiality power pointPatient confidentiality power point
Patient confidentiality power pointchwiso8418
 
Patient confidentiality power point
Patient confidentiality power pointPatient confidentiality power point
Patient confidentiality power pointchwiso8418
 
Hipaa Refresher Training
Hipaa Refresher TrainingHipaa Refresher Training
Hipaa Refresher TrainingBrian
 
Data Security and Privacy Practices
Data Security and Privacy PracticesData Security and Privacy Practices
Data Security and Privacy PracticesSpringfield Clinic
 
PROTECTED HEALTH INFORMATION_PATIENT PRIVACY
PROTECTED HEALTH INFORMATION_PATIENT PRIVACYPROTECTED HEALTH INFORMATION_PATIENT PRIVACY
PROTECTED HEALTH INFORMATION_PATIENT PRIVACYDenise Masella
 
Hippa health admin week 1 question 2
Hippa health admin week 1 question 2Hippa health admin week 1 question 2
Hippa health admin week 1 question 2Ashford Univeristy
 
William schuch week 1 mha690 capstone ppp
William schuch week 1 mha690 capstone pppWilliam schuch week 1 mha690 capstone ppp
William schuch week 1 mha690 capstone pppWilliam Schuch
 
C. Gibbs MHA 690 week 1 discussion 2
C. Gibbs MHA 690 week 1 discussion 2C. Gibbs MHA 690 week 1 discussion 2
C. Gibbs MHA 690 week 1 discussion 2CGibbs3121
 
Mha 690 week 1 discussion presentation
Mha 690 week 1 discussion presentationMha 690 week 1 discussion presentation
Mha 690 week 1 discussion presentationfalane
 
Hipaa overview 073118
Hipaa overview 073118Hipaa overview 073118
Hipaa overview 073118robint2125
 

Similar a Hipaa (20)

Are You HIPAA Safe?
Are You HIPAA Safe?Are You HIPAA Safe?
Are You HIPAA Safe?
 
5 hipaa training
5 hipaa training5 hipaa training
5 hipaa training
 
Annual HIPAA Education
Annual HIPAA EducationAnnual HIPAA Education
Annual HIPAA Education
 
Patient privacy and confidentiality training
Patient privacy and confidentiality trainingPatient privacy and confidentiality training
Patient privacy and confidentiality training
 
Hipaa 2012
Hipaa 2012Hipaa 2012
Hipaa 2012
 
Rems hipaa
Rems hipaaRems hipaa
Rems hipaa
 
Patient confidentiality power point
Patient confidentiality power pointPatient confidentiality power point
Patient confidentiality power point
 
Patient confidentiality power point
Patient confidentiality power pointPatient confidentiality power point
Patient confidentiality power point
 
Hipaa pesentation
Hipaa pesentationHipaa pesentation
Hipaa pesentation
 
Hipaa Refresher Training
Hipaa Refresher TrainingHipaa Refresher Training
Hipaa Refresher Training
 
Understanding hipaa
Understanding hipaaUnderstanding hipaa
Understanding hipaa
 
Data Security and Privacy Practices
Data Security and Privacy PracticesData Security and Privacy Practices
Data Security and Privacy Practices
 
Phi masella
Phi masellaPhi masella
Phi masella
 
PROTECTED HEALTH INFORMATION_PATIENT PRIVACY
PROTECTED HEALTH INFORMATION_PATIENT PRIVACYPROTECTED HEALTH INFORMATION_PATIENT PRIVACY
PROTECTED HEALTH INFORMATION_PATIENT PRIVACY
 
Hippa health admin week 1 question 2
Hippa health admin week 1 question 2Hippa health admin week 1 question 2
Hippa health admin week 1 question 2
 
William schuch week 1 mha690 capstone ppp
William schuch week 1 mha690 capstone pppWilliam schuch week 1 mha690 capstone ppp
William schuch week 1 mha690 capstone ppp
 
C. Gibbs MHA 690 week 1 discussion 2
C. Gibbs MHA 690 week 1 discussion 2C. Gibbs MHA 690 week 1 discussion 2
C. Gibbs MHA 690 week 1 discussion 2
 
Hipaa training
Hipaa trainingHipaa training
Hipaa training
 
Mha 690 week 1 discussion presentation
Mha 690 week 1 discussion presentationMha 690 week 1 discussion presentation
Mha 690 week 1 discussion presentation
 
Hipaa overview 073118
Hipaa overview 073118Hipaa overview 073118
Hipaa overview 073118
 

Más de pssurgery

Más de pssurgery (11)

Customer Service 2015
Customer Service 2015Customer Service 2015
Customer Service 2015
 
Infection Control 2015
Infection Control 2015Infection Control 2015
Infection Control 2015
 
Safety-2015
Safety-2015Safety-2015
Safety-2015
 
Compliance2015
Compliance2015Compliance2015
Compliance2015
 
Blood
BloodBlood
Blood
 
Compliance
ComplianceCompliance
Compliance
 
Cultural sensitivity
Cultural sensitivityCultural sensitivity
Cultural sensitivity
 
Quality
QualityQuality
Quality
 
Infection
InfectionInfection
Infection
 
Abuse
AbuseAbuse
Abuse
 
Safety
SafetySafety
Safety
 

Último

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 

Último (20)

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 

Hipaa

  • 2. HIPAA • Has been a federal privacy regulation since 2003. Covers privacy and security of health information. • Reviewed in annual education • Taught in new employee orientation • The facility Security Officer is Christie Messinger • The facility Privacy Officer is Alane Bryan
  • 3. HITECH • Does not replace HIPAA—it gives it TEETH! • Requires a breach notification policy • Encourages EHR adoption • Provides strict data protection regulations for more secure patient privacy
  • 4. New Fines as of March 26, 2013 Violation Type Each Violation Repeat Violations/Yr. Did not know $100 - $50,000 $1.5 million Reasonable Cause $1,000 - $50,000 $1.5 million Willful Neglect – Corrected $10,000 - $50,000 $1.5 million Willful Neglect – Not Corrected $50,000 $1.5 million •Healthcare organizations or providers may be held liable for violations. •Individual employees may be prosecuted or may be sued for civil penalties.
  • 5. Breach Notifications  Must notify individuals and HHS and, in some cases the media, of any substantiated breaches within 60 days.  Breaches affecting 500 or more patients will be posted to the HHS.gov website.
  • 6. Documented Breaches • Mass General • California Breaches • BCBS of TN Breach • Individual Prosecution • Personal Gain
  • 7. Top Privacy Violations • Stolen laptops/computers • Lost CDs • ID theft/Social Security Numbers • Medicare Fraud • Access to EMR with no job-related need
  • 8. Privacy Breach Examples • Using Social Networking to talk about patients • Discussing PHI with employees or family who do not have a job-related need • Looking at EMR out of concern or curiosity • Telling others that a patient was “in” for treatment • Discussing progress or prognosis in front of family without permission
  • 9. More Privacy Breach Examples • Using chart to get information to use against patient in lawsuit or divorce • Looking in minor child’s EMR • Taking a peek for “educational purposes” • Starting conversations with “Don’t tell anyone I told you this, but…” • Sharing computer access/passwords
  • 10. Permitted HIPAA Exceptions • Treatment, Payment, Operations • Some law enforcement exceptions • Public health reporting • When in doubt, get a Signed Release • Disclose “minimal necessary” amount of PHI
  • 11. HIPAA, HITECH, & YOU • Patients/family members requesting patient information AFTER DISCHARGE should be referred to the HIM Department • If a patient requests information during an admission, make sure the report is FINAL before giving the information to the patient or to their designee (document the designee). We do not release information unless it is in a FINAL status. • Discuss patient information as quietly as possible
  • 12. HIPAA, HITECH, & YOU • Try not to say the patient’s name repeatedly • Make sure paper containing PHI makes it to a shred bin • Shred bins should be dumped in large bins each day • Use fax cover sheets with the confidentiality clause • Do not leave messages with too much information • Wear your employee ID badge at all times
  • 13. HIPAA, HITECH, & YOU • Use workstations for intended purposes – No gaming, no unauthorized downloading of files, personal emails are subject to access by P & S Surgical Hospital • Log-off or lock your computer when you are not using it • Make sure others cannot view your computer screen
  • 14. HIPAA, HITECH, & YOU • Keep passwords secure • Use your own individual password • Avoid sharing passwords • Trigger encryption for emails containing PHI being sent outside the organization • If photos must be taken of a patient, use a P & S camera or device; NEVER use your personal camera or smart phone
  • 15. HIPAA, HITECH, & YOU • Never share proprietary or confidential information in blogs or on social media sites • Report potential breaches, inappropriate disclosures, or otherwise suspect behavior to your direct supervisor, the Privacy Officer, the Security Officer, or the Corporate Compliance Officer
  • 16. End of Presentation • This is the end of presentation. Click on blue Quiz button next.