SlideShare uma empresa Scribd logo
1 de 30
Baixar para ler offline
Introduction to
Health Insurance Portability and
Accountability Act (HIPAA)
Privacy and Security Rules
Speaker: Chenyu Lee
1
HIPAA Background
• 1996. Health Insurance Portability and Accountability Act (HIPAA), Public
Law 104-191.
– Department of Health and Human Services (HHS) adopts national standards for
electronic health care transactions and code sets, unique health identifiers, and security.
• 2009. Health Information Technology for Economic and Clinical Health Act
(HITECH) enacted as part of the American Recovery and Reinvestment Act
of 2009 (ARRA).
• 2010. Patient Protection and Affordable Care Act of 2010 (ACA).
• 2013. HIPAA Omnibus Rule makes changes to existing privacy, security and
breach notification requirements.
2
HIPAA Regulations
• CFR 45 PART 160: General administrative requirements
• CFR 45 PART 162: Administrative requirements
• CFR 45 PART 164: Security and privacy rules
3
DEFINITIONS
§ 160.103
4
Business Associate
• Business Associate includes the partners that may provide
legal, actuarial, accounting, consulting, data aggregation,
management, administration or financial services wherein the
services require the disclosure of individually identifiable
health information.
• A key concern, among many, is that some software vendors
almost certainly will be categorized as Business Associates.
5
Covered Entity & Electronic Media
• Covered Entity means:
– A health plan
– A health care clearinghouse
– A health care provider who transmits any health information in electronic
form in connection with a transaction covered by this subchapter.
• Electronic media means:
– Electronic storage material on which data is or may be recorded electronically.
– Transmission media used to exchange information already in electronic
storage media.
6
Health Care & Health Care Provider
& Health information
• Health care means:
– Care, services, or supplies related to the health of an individual.
• Health care provider means:
– A provider of medical or health services, and any other person or organization
who furnishes, bills, or is paid for health care in the normal course of business.
• Health information means:
– Any information, whether oral or recorded in any form or medium.
7
Individual &
Individually Identifiable Health Information &
Protected Health Information (PHI)
• Individual means:
– The person who is the subject of protected health information.
• Individually identifiable health information that
– Identifies the individual
– Or with respect to which there is a reasonable basis to believe the information
can be used to identify the individual.
• Protected health information means:
– Individually identifiable health information that is
• Transmitted by electronic media
• Maintained in electronic media
• Transmitted or maintained in any other form or medium
8
PHI Includes One or More of Identifiers
(§164.514(b)(2)(i))
– Names
– Addresses including Zip
Codes
– All Dates
– Telephone & Fax Numbers
– Email Addresses
– Social Security Numbers
– Medical Record Numbers
– Health Plan Numbers
– License Numbers
– Vehicle Identification
Numbers
– Account Numbers
– Biometric Identifiers
– Full Face Photos
– Any Other Unique
Identifying Number,
Characteristic, or Code
9
Use and Disclosure of PHI
• Use of PHI refers to how PHI is internally accessed, shared and
utilized by the covered entity that maintains such information.
• Disclosure of PHI refers to how PHI is shared with individuals
or entities externally.
10
Notice of Privacy Practices (NPP)
• Notice of Privacy Practices means:
– Providers and Health Plans must have a Notice of Privacy Practices (NPP)
• It provides a detailed description of the various uses and disclosures of PHI that are
permissible without obtaining a patient’s authorization.
– In general, anytime you release patient information for a reason unrelated to
treatment, payment (e.g., billing) or healthcare operations (TPO), an
authorization is required.
11
Treatment, Payment and Operations (TPO)
• Treatment: Various activities related to patient care.
• Payment: Various activities related to paying for or getting
paid for health care services.
• Health Care Operations: Generally refers to day-to-day
activities of a covered entity, such as planning, management,
training, improving quality, providing services, and education.
• NOTE:
– Research is not considered TPO.
– Written patient authorization is required to access PHI for research unless
authorization waiver is approved by the Institutional Review Board (IRB).
12
SECURITY RULES
§ 164.3xx
13
General Rule (§164.306)
• General requirements:
– Ensure the confidentiality, integrity, and availability of all its ePHI.
– Protect against any reasonably anticipated threats or hazards of its ePHI.
– Protect against any reasonably anticipated uses or disclosures of ePHI not
permitted.
• Implementation specifications.
– Required specifications must be implemented.
– Addressable specifications must be assessed and implemented as specified if
reasonable and appropriate to the Covered Entity.
• Maintenance.
14
Administrative Safeguards (§164.308(a))
– Security management process
– Assigned security
responsibility
– Workforce security
– Information access
management
– Security awareness and
training
– Security incident procedures
– Contingency plan
– Evaluation
15
Physical Safeguards (§164.310)
• Facility access controls.
• Workstation use.
• Workstation security.
• Device and media controls.
16
Policies and Procedures and Documentation
Requirements. (§164.316(b)(2))
• Time limit.
– Retain the documentation required for 6 years from the date of its
creation or the date when it last was in effect, whichever is later.
• Availability
• Updates
17
Technical Safeguards (§164.312)
• Access control.
• Audit controls.
• Integrity.
• Person or entity authentication.
• Transmission security.
18
PRIVACY RULES
§ 164.5xx
19
Required/Addressable Specifications of
Security Standards
Standards Specifications Sections
Risk Analysis 164.308(a)(1)(ii)(A)
Risk Management 164.308(a)(1)(ii)(B)
Sanction Policy 164.308(a)(1)(ii)(C)
Information System Activity Review 164.308(a)(1)(ii)(D)
Assigned Security
Responsibility
Assigned Security Responsibility 164.308(a)(2)
Authorization and/or Supervision 164.308(a)(3)(ii)(A)
Workforce Clearance Procedure 164.308(a)(3)(ii)(B)
Termination Procedures 164.308(a)(3)(ii)(C)
Isolating Health care Clearinghouse Function 164.308(a)(4)(ii)(A)
Access Authorization 164.308(a)(4)(ii)(B)
Access Establishment and Modification 164.308(a)(4)(ii)(C)
Security Reminders 164.308(a)(5)(ii)(A)
Log-in Monitoring 164.308(a)(5)(ii)(B)
Protection from Malicious Software 164.308(a)(5)(ii)(C)
Password Management 164.308(a)(5)(ii)(D)
Security Incident Procedures Response and Reporting 164.308(a)(6)
Data Backup Plan 164.308(a)(7)(ii)(A)
Disaster Recovery Plan 164.308(a)(7)(ii)(B)
Emergency Mode Operation Plan 164.308(a)(7)(ii)(C)
Testing and Revision Procedure 164.308(a)(7)(ii)(D)
Applications and Data Criticality Analysis 164.308(a)(7)(ii)(E)
Evaluation Evaluation 164.308(a)(8)
Business Associate Contracts
and Other Arrangement
Written Contract or Other Arrangement 164.308(b)(3)
Security Management Process
Workforce Security
Information Access
Mangement
Security Awareness and
Training
Contingency Plan
20
Required/Addressable Specifications of
Security Standards
Standards Specifications Sections
Contingency Operations 164.310(a)(2)(i)
Facility Security Plan 164.310(a)(2)(ii)
Access Control and Validation Procedures 164.310(a)(2)(iii)
Maintenance Records 164.310(a)(2)(iv)
Workstation Use Workstation Use 164.310(b)
Workstation Security Workstation Security 164.310(c)
Disposal 164.310(d)(2)(i)
Media Re-use 164.310(d)(1)(2)(ii)
Accountability 164.310(d)(2)(iii)
Data Backup and Storage 164.310(d)(2)(iv)
Unique User Identification 164.312(a)(2)(i)
Emergency Access Procedure 164.312(a)(2)(ii)
Automatic Logoff 164.312(a)(2)(iii)
Encryption and Decryption 164.312(a)(2)(iv)
Audit Controls Audit Controls 164.312(b)
Integrity Mechanism to Authenticate Electronic Protecte164.312(c)(1)
Person or Entity
Authentication
Person or Entity Authentication 164.312(d)
Integrity Controls 164.312(e)(2)(i)
Encryption 164.312(e)(2)(ii)
Time Limit 164.316(b)(2)(i)
Avilability 164.316(b)(2)(ii)
Update 164.316(b)(2)(iii)
Documentation
Device and Media Control
Access Control
Transmission Security
Facility Access Control
21
Minimum Necessary Rule (§164.502(b))
• Generally, the amount of PHI used, shared, accessed or
requested must be limited to only what is needed.
• Workers should access or use only the PHI necessary to carry
out their job responsibilities.
22
Authorization (§164.508)
• A covered entity may not use or disclose protected health
information for reasons generally not related to treatment,
payment or healthcare operations without an authorization.
• The Authorization must include:
– A detailed description of the PHI to be disclosed, who will make the disclosure,
to whom the disclosure will be made, expiration date, the purpose of the
disclosure, and signature.
– The individual's right to revoke, the ability or inability to condition usage, and
the potential for information disclosed.
23
Types of Disclosures
• No Authorization Required (§ 164.512)
• Authorization Required, but Must Give Opportunity to Object
(§ 164.510)
• Authorization Required (§ 164.508)
24
Uses and Disclosures for Which An Authorization or
Opportunity to Agree or Object Is Not Required
• To disclose PHI to the patient (§ 164.502)
• To use or disclose PHI for treatment, payment or healthcare
operations. (§ 164.502)
• Certain disclosures required by law (for example, public health
reporting of diseases, child abuse/neglect cases, etc.)
(§ 164.512(a)-(l))
25
Uses and Disclosures for Which An Authorization
Is Required
• A covered entity may not use or disclose protected health
information without an authorization. (§ 164.508(a)(1))
• To access, use or disclose PHI for research (§ 164.512(i)(1)(i))
• For marketing activities and sale of PHI (§ 164.508(a)(3))
26
Uses and Disclosures Requiring An Opportunity
for The Individual to Agree or to Object
• The Patient must be offered an opportunity to object before
discussing PHI with a patient’s family or friends.
(§ 164.510(b)(1)(i))
• Limited PHI (e.g., patient’s hospital room/location number) is
included in the “Hospital Directory” but patients are offered
an “Opt Out” opportunity and certain disclosures to clergy
members. (§ 164.510(b)(3))
• Exception: Emergency circumstances (§ 164.510(a)(3))
27
Breach (§164.402(b))
• Breach means the acquisition, access, use, or disclosure of
protected health information in a manner not permitted
under privacy rules.
• Amount of a civil money penalty.
– In the amount of less than $100 or more than $50,000 for each violation
– In excess of $1,500,000 for identical violations during a calendar year
• Criminal Liability
– Offenses committed with the intent to sell, transfer, or use individually
identifiable health information for commercial advantage, personal gain or
malicious harm permit fines of $250,000 and imprisonment for up to ten
years.
28
Companies & Fines
Entity Fined Fine Violation
CIGNET (Feb, 2011) $4,300,000 Online database application error.
Alaska Department of Health
and Human Services (June, 2012)
$1,700,000 Unencrypted USB hard drive stolen, poor policies and
risk analysis.
WellPoint (Sep, 2012) $1,700,000 Did not have technical safeguards in
place to verify the person/entity seeking access to PHI
in the database. Failed to conduct a technical evaluation
in response to software upgrade.
Blue Cross Blue Shield of
Tennessee (Mar, 2012)
$1,500,000 57 unencrypted hard drives stolen.
Massachusetts Eye and Ear Infirmary and
Massachusetts Eye and Ear Associates
(Sep, 2012)
$1,500,000 Unencrypted laptop stolen, poor risk
analysis, policies.
Affinity Health Plan (Aug, 2013) $1,215,780 Returned photocopiers without erasing the hard drives.
South Shore Hospital (May, 2012) $750,000 Backup tapes went missing on the way to contractor.
Idaho State University (May, 2013) $400,000 Breach of unsecured ePHI.
29
THANKS FOR LISTENING
30

Mais conteúdo relacionado

Mais procurados

Documentation in acute care chapter 5
Documentation in acute care chapter 5Documentation in acute care chapter 5
Documentation in acute care chapter 5Byamba Uranchimeg
 
HIPAA Training: Privacy Review and Audit Survival Guide
HIPAA Training: Privacy Review and Audit Survival GuideHIPAA Training: Privacy Review and Audit Survival Guide
HIPAA Training: Privacy Review and Audit Survival Guidebenefitexpress
 
Health insurance portability and act(hipaa)2
Health insurance portability and act(hipaa)2Health insurance portability and act(hipaa)2
Health insurance portability and act(hipaa)29535814851
 
Knowing confidentiality
Knowing confidentialityKnowing confidentiality
Knowing confidentialityjessie66
 
2017 HIPAA Clinical Research Training
2017 HIPAA Clinical Research Training2017 HIPAA Clinical Research Training
2017 HIPAA Clinical Research TrainingCynthia Holland
 
Keys To HIPAA Compliance
Keys To HIPAA ComplianceKeys To HIPAA Compliance
Keys To HIPAA ComplianceCBIZ, Inc.
 
Hipaa journal com - HIPAA compliance guide
Hipaa journal com - HIPAA compliance guideHipaa journal com - HIPAA compliance guide
Hipaa journal com - HIPAA compliance guideFelipe Prado
 
Health Insurance Portability and Accountability Act (HIPPA) - Kloudlearn
Health Insurance Portability and Accountability Act (HIPPA) - KloudlearnHealth Insurance Portability and Accountability Act (HIPPA) - Kloudlearn
Health Insurance Portability and Accountability Act (HIPPA) - KloudlearnKloudLearn
 
Patient Privacy Provisions of the HITECH Act Implications for Patients and Sm...
Patient Privacy Provisions of the HITECH Act Implications for Patients and Sm...Patient Privacy Provisions of the HITECH Act Implications for Patients and Sm...
Patient Privacy Provisions of the HITECH Act Implications for Patients and Sm...Xiaoming Zeng
 
Hipaa in clinical trails
Hipaa in clinical trailsHipaa in clinical trails
Hipaa in clinical trailsTejaswi Reddy
 

Mais procurados (20)

Hipaa and social media using new
Hipaa and social media using newHipaa and social media using new
Hipaa and social media using new
 
What You Don’t Know About the HIPAA Security Rule
What You Don’t Know About the HIPAA Security RuleWhat You Don’t Know About the HIPAA Security Rule
What You Don’t Know About the HIPAA Security Rule
 
Documentation in acute care chapter 5
Documentation in acute care chapter 5Documentation in acute care chapter 5
Documentation in acute care chapter 5
 
HIPAA Training: Privacy Review and Audit Survival Guide
HIPAA Training: Privacy Review and Audit Survival GuideHIPAA Training: Privacy Review and Audit Survival Guide
HIPAA Training: Privacy Review and Audit Survival Guide
 
Hipaa
HipaaHipaa
Hipaa
 
HIPAA and How it Applies to You
HIPAA and How it Applies to YouHIPAA and How it Applies to You
HIPAA and How it Applies to You
 
Health insurance portability and act(hipaa)2
Health insurance portability and act(hipaa)2Health insurance portability and act(hipaa)2
Health insurance portability and act(hipaa)2
 
HIPAA
HIPAAHIPAA
HIPAA
 
Annual HIPAA Training
Annual HIPAA TrainingAnnual HIPAA Training
Annual HIPAA Training
 
Knowing confidentiality
Knowing confidentialityKnowing confidentiality
Knowing confidentiality
 
2017 HIPAA Clinical Research Training
2017 HIPAA Clinical Research Training2017 HIPAA Clinical Research Training
2017 HIPAA Clinical Research Training
 
Keys To HIPAA Compliance
Keys To HIPAA ComplianceKeys To HIPAA Compliance
Keys To HIPAA Compliance
 
Hipaa journal com - HIPAA compliance guide
Hipaa journal com - HIPAA compliance guideHipaa journal com - HIPAA compliance guide
Hipaa journal com - HIPAA compliance guide
 
HIPAA Compliance
HIPAA ComplianceHIPAA Compliance
HIPAA Compliance
 
HIPAA for Dummies
HIPAA for DummiesHIPAA for Dummies
HIPAA for Dummies
 
Health Insurance Portability and Accountability Act (HIPPA) - Kloudlearn
Health Insurance Portability and Accountability Act (HIPPA) - KloudlearnHealth Insurance Portability and Accountability Act (HIPPA) - Kloudlearn
Health Insurance Portability and Accountability Act (HIPPA) - Kloudlearn
 
The Basics of HIPAA
The Basics of HIPAA The Basics of HIPAA
The Basics of HIPAA
 
Patient Privacy Provisions of the HITECH Act Implications for Patients and Sm...
Patient Privacy Provisions of the HITECH Act Implications for Patients and Sm...Patient Privacy Provisions of the HITECH Act Implications for Patients and Sm...
Patient Privacy Provisions of the HITECH Act Implications for Patients and Sm...
 
Hipaa in clinical trails
Hipaa in clinical trailsHipaa in clinical trails
Hipaa in clinical trails
 
HIPAA
HIPAAHIPAA
HIPAA
 

Destaque

1895 In Taiwan
1895 In Taiwan1895 In Taiwan
1895 In TaiwanChris Lee
 
El Joc dels errors
El Joc dels errorsEl Joc dels errors
El Joc dels errorscio
 
Thirst 地球是枯渴的
Thirst 地球是枯渴的Thirst 地球是枯渴的
Thirst 地球是枯渴的Chris Lee
 
比考試和成績更重要的事
比考試和成績更重要的事比考試和成績更重要的事
比考試和成績更重要的事Chris Lee
 
Super Smash Brothers Brawl Characters
Super Smash Brothers Brawl CharactersSuper Smash Brothers Brawl Characters
Super Smash Brothers Brawl Charactersgueste8c898
 
Shelley Atkins Cis 516 Op Manager
Shelley Atkins  Cis 516 Op ManagerShelley Atkins  Cis 516 Op Manager
Shelley Atkins Cis 516 Op Managershelleyatkins
 
Apresentação GDG Natal FLISOL NATAL 2013
Apresentação GDG Natal FLISOL NATAL 2013Apresentação GDG Natal FLISOL NATAL 2013
Apresentação GDG Natal FLISOL NATAL 2013Mayron Cachina
 
7招搶救過勞眼睛
7招搶救過勞眼睛7招搶救過勞眼睛
7招搶救過勞眼睛Chris Lee
 
El Joc Dels Errors1
El Joc Dels Errors1El Joc Dels Errors1
El Joc Dels Errors1cio
 
餓是今生最深的記憶 朱炎
餓是今生最深的記憶 朱炎餓是今生最深的記憶 朱炎
餓是今生最深的記憶 朱炎Chris Lee
 
GöLler Ve Olusumlari
GöLler Ve OlusumlariGöLler Ve Olusumlari
GöLler Ve Olusumlaripilaki
 

Destaque (19)

Miro1
Miro1Miro1
Miro1
 
1895 In Taiwan
1895 In Taiwan1895 In Taiwan
1895 In Taiwan
 
Alg2
Alg2Alg2
Alg2
 
El Joc dels errors
El Joc dels errorsEl Joc dels errors
El Joc dels errors
 
Zune
ZuneZune
Zune
 
Auca1 5è
Auca1 5èAuca1 5è
Auca1 5è
 
Thirst 地球是枯渴的
Thirst 地球是枯渴的Thirst 地球是枯渴的
Thirst 地球是枯渴的
 
比考試和成績更重要的事
比考試和成績更重要的事比考試和成績更重要的事
比考試和成績更重要的事
 
Super Smash Brothers Brawl Characters
Super Smash Brothers Brawl CharactersSuper Smash Brothers Brawl Characters
Super Smash Brothers Brawl Characters
 
Auca1 5è
Auca1 5èAuca1 5è
Auca1 5è
 
Shelley Atkins Cis 516 Op Manager
Shelley Atkins  Cis 516 Op ManagerShelley Atkins  Cis 516 Op Manager
Shelley Atkins Cis 516 Op Manager
 
Alg1f Nov 28
Alg1f Nov 28Alg1f Nov 28
Alg1f Nov 28
 
Apresentação GDG Natal FLISOL NATAL 2013
Apresentação GDG Natal FLISOL NATAL 2013Apresentação GDG Natal FLISOL NATAL 2013
Apresentação GDG Natal FLISOL NATAL 2013
 
7招搶救過勞眼睛
7招搶救過勞眼睛7招搶救過勞眼睛
7招搶救過勞眼睛
 
El Joc Dels Errors1
El Joc Dels Errors1El Joc Dels Errors1
El Joc Dels Errors1
 
餓是今生最深的記憶 朱炎
餓是今生最深的記憶 朱炎餓是今生最深的記憶 朱炎
餓是今生最深的記憶 朱炎
 
Alg1e Nov 28
Alg1e Nov 28Alg1e Nov 28
Alg1e Nov 28
 
Alg1f Jan10
Alg1f Jan10Alg1f Jan10
Alg1f Jan10
 
GöLler Ve Olusumlari
GöLler Ve OlusumlariGöLler Ve Olusumlari
GöLler Ve Olusumlari
 

Semelhante a HIPAA2

health insurance portability and accountability act.pptx
health insurance portability and accountability act.pptxhealth insurance portability and accountability act.pptx
health insurance portability and accountability act.pptxamartya2087
 
MHA690 confidentiality training
MHA690 confidentiality trainingMHA690 confidentiality training
MHA690 confidentiality trainingsdavis49
 
MPCA HIPAA Compliance/Meaningful Use Requirements and Security Risk Assessmen...
MPCA HIPAA Compliance/Meaningful Use Requirements and Security Risk Assessmen...MPCA HIPAA Compliance/Meaningful Use Requirements and Security Risk Assessmen...
MPCA HIPAA Compliance/Meaningful Use Requirements and Security Risk Assessmen...Michigan Primary Care Association
 
Legal implications of HIPAA, HITECH and BAAs
Legal implications of HIPAA, HITECH and BAAsLegal implications of HIPAA, HITECH and BAAs
Legal implications of HIPAA, HITECH and BAAsOnline Tech
 
Health Insurance Portability & Accountability Act (HIPAA)
Health Insurance Portability & Accountability Act (HIPAA)Health Insurance Portability & Accountability Act (HIPAA)
Health Insurance Portability & Accountability Act (HIPAA)Arpitha Aarushi
 
HIPAA/HITECH Requirements for FQHCs and the New Omnibus Rule
HIPAA/HITECH Requirements for FQHCs and the New Omnibus RuleHIPAA/HITECH Requirements for FQHCs and the New Omnibus Rule
HIPAA/HITECH Requirements for FQHCs and the New Omnibus RuleMichigan Primary Care Association
 
Privacy, Confidentiality, and Security Lecture 2_slides
Privacy, Confidentiality, and Security Lecture 2_slidesPrivacy, Confidentiality, and Security Lecture 2_slides
Privacy, Confidentiality, and Security Lecture 2_slidesZakCooper1
 
hipaa by roy.pptx
hipaa by roy.pptxhipaa by roy.pptx
hipaa by roy.pptxSubhamRoy63
 
Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentialityJake Facer
 
Comp8 unit6a lecture_slides
Comp8 unit6a lecture_slidesComp8 unit6a lecture_slides
Comp8 unit6a lecture_slidesCMDLMS
 
Keynote Presentation "Building a Culture of Privacy and Security into Your Or...
Keynote Presentation "Building a Culture of Privacy and Security into Your Or...Keynote Presentation "Building a Culture of Privacy and Security into Your Or...
Keynote Presentation "Building a Culture of Privacy and Security into Your Or...Health IT Conference – iHT2
 
Hippa privacy and security awareness
Hippa privacy and security awarenessHippa privacy and security awareness
Hippa privacy and security awarenessCharles Taft
 
HIPAA Rights Privacy and Enforcements RD.pptx
HIPAA Rights  Privacy and Enforcements RD.pptxHIPAA Rights  Privacy and Enforcements RD.pptx
HIPAA Rights Privacy and Enforcements RD.pptxRAJIV RANJAN DAS
 
Hitech changes-to-hipaa
Hitech changes-to-hipaaHitech changes-to-hipaa
Hitech changes-to-hipaageeksikh
 
How to avoid being caught out by HIPAA compliance?
How to avoid being caught out by HIPAA compliance?How to avoid being caught out by HIPAA compliance?
How to avoid being caught out by HIPAA compliance?Lepide USA Inc
 
HIPAA and FDCPA Compliance for Process Servers
HIPAA and FDCPA Compliance for Process ServersHIPAA and FDCPA Compliance for Process Servers
HIPAA and FDCPA Compliance for Process ServersLawgical
 

Semelhante a HIPAA2 (20)

health insurance portability and accountability act.pptx
health insurance portability and accountability act.pptxhealth insurance portability and accountability act.pptx
health insurance portability and accountability act.pptx
 
MHA690 confidentiality training
MHA690 confidentiality trainingMHA690 confidentiality training
MHA690 confidentiality training
 
MPCA HIPAA Compliance/Meaningful Use Requirements and Security Risk Assessmen...
MPCA HIPAA Compliance/Meaningful Use Requirements and Security Risk Assessmen...MPCA HIPAA Compliance/Meaningful Use Requirements and Security Risk Assessmen...
MPCA HIPAA Compliance/Meaningful Use Requirements and Security Risk Assessmen...
 
Legal implications of HIPAA, HITECH and BAAs
Legal implications of HIPAA, HITECH and BAAsLegal implications of HIPAA, HITECH and BAAs
Legal implications of HIPAA, HITECH and BAAs
 
Health Insurance Portability & Accountability Act (HIPAA)
Health Insurance Portability & Accountability Act (HIPAA)Health Insurance Portability & Accountability Act (HIPAA)
Health Insurance Portability & Accountability Act (HIPAA)
 
HIPAA/HITECH Requirements for FQHCs and the New Omnibus Rule
HIPAA/HITECH Requirements for FQHCs and the New Omnibus RuleHIPAA/HITECH Requirements for FQHCs and the New Omnibus Rule
HIPAA/HITECH Requirements for FQHCs and the New Omnibus Rule
 
Overview on data privacy
Overview on data privacy Overview on data privacy
Overview on data privacy
 
Data Management Protection Acts
Data Management Protection ActsData Management Protection Acts
Data Management Protection Acts
 
Privacy, Confidentiality, and Security Lecture 2_slides
Privacy, Confidentiality, and Security Lecture 2_slidesPrivacy, Confidentiality, and Security Lecture 2_slides
Privacy, Confidentiality, and Security Lecture 2_slides
 
hipaa by roy.pptx
hipaa by roy.pptxhipaa by roy.pptx
hipaa by roy.pptx
 
Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentiality
 
Comp8 unit6a lecture_slides
Comp8 unit6a lecture_slidesComp8 unit6a lecture_slides
Comp8 unit6a lecture_slides
 
Keynote Presentation "Building a Culture of Privacy and Security into Your Or...
Keynote Presentation "Building a Culture of Privacy and Security into Your Or...Keynote Presentation "Building a Culture of Privacy and Security into Your Or...
Keynote Presentation "Building a Culture of Privacy and Security into Your Or...
 
Billings
BillingsBillings
Billings
 
Hippa privacy and security awareness
Hippa privacy and security awarenessHippa privacy and security awareness
Hippa privacy and security awareness
 
HIPAA Rights Privacy and Enforcements RD.pptx
HIPAA Rights  Privacy and Enforcements RD.pptxHIPAA Rights  Privacy and Enforcements RD.pptx
HIPAA Rights Privacy and Enforcements RD.pptx
 
Hitech changes-to-hipaa
Hitech changes-to-hipaaHitech changes-to-hipaa
Hitech changes-to-hipaa
 
Hipaa for business associates simple
Hipaa for business associates   simpleHipaa for business associates   simple
Hipaa for business associates simple
 
How to avoid being caught out by HIPAA compliance?
How to avoid being caught out by HIPAA compliance?How to avoid being caught out by HIPAA compliance?
How to avoid being caught out by HIPAA compliance?
 
HIPAA and FDCPA Compliance for Process Servers
HIPAA and FDCPA Compliance for Process ServersHIPAA and FDCPA Compliance for Process Servers
HIPAA and FDCPA Compliance for Process Servers
 

Mais de Chris Lee

唐李氏歷史
唐李氏歷史唐李氏歷史
唐李氏歷史Chris Lee
 
美加医界:10个理由禁儿童用电子产品 Ten reason for prohibiting kids from using electronic devices
美加医界:10个理由禁儿童用电子产品 Ten reason for prohibiting kids from using electronic devices美加医界:10个理由禁儿童用电子产品 Ten reason for prohibiting kids from using electronic devices
美加医界:10个理由禁儿童用电子产品 Ten reason for prohibiting kids from using electronic devicesChris Lee
 
Algorithm2e package for Latex
Algorithm2e package for LatexAlgorithm2e package for Latex
Algorithm2e package for LatexChris Lee
 
留住北京胡同
留住北京胡同留住北京胡同
留住北京胡同Chris Lee
 
北極熊母子情深
北極熊母子情深北極熊母子情深
北極熊母子情深Chris Lee
 
Proactive Behavior 前攝行為
Proactive Behavior 前攝行為Proactive Behavior 前攝行為
Proactive Behavior 前攝行為Chris Lee
 
聰明人必做的十件事
聰明人必做的十件事聰明人必做的十件事
聰明人必做的十件事Chris Lee
 
早晨的第一杯
早晨的第一杯早晨的第一杯
早晨的第一杯Chris Lee
 
再別康橋及牛津
再別康橋及牛津再別康橋及牛津
再別康橋及牛津Chris Lee
 
海洋垃圾
海洋垃圾海洋垃圾
海洋垃圾Chris Lee
 
北越下龍灣
北越下龍灣北越下龍灣
北越下龍灣Chris Lee
 
生命的勇氣
生命的勇氣生命的勇氣
生命的勇氣Chris Lee
 
一位老師的告白
一位老師的告白一位老師的告白
一位老師的告白Chris Lee
 
品格教育.天下
品格教育.天下品格教育.天下
品格教育.天下Chris Lee
 
台南小吃呷透透
台南小吃呷透透台南小吃呷透透
台南小吃呷透透Chris Lee
 
三則感人小故事
三則感人小故事三則感人小故事
三則感人小故事Chris Lee
 
我們這一代
我們這一代我們這一代
我們這一代Chris Lee
 
最高境界
最高境界最高境界
最高境界Chris Lee
 

Mais de Chris Lee (20)

唐李氏歷史
唐李氏歷史唐李氏歷史
唐李氏歷史
 
美加医界:10个理由禁儿童用电子产品 Ten reason for prohibiting kids from using electronic devices
美加医界:10个理由禁儿童用电子产品 Ten reason for prohibiting kids from using electronic devices美加医界:10个理由禁儿童用电子产品 Ten reason for prohibiting kids from using electronic devices
美加医界:10个理由禁儿童用电子产品 Ten reason for prohibiting kids from using electronic devices
 
Algorithm2e package for Latex
Algorithm2e package for LatexAlgorithm2e package for Latex
Algorithm2e package for Latex
 
留住北京胡同
留住北京胡同留住北京胡同
留住北京胡同
 
Gadgets
GadgetsGadgets
Gadgets
 
北極熊母子情深
北極熊母子情深北極熊母子情深
北極熊母子情深
 
Proactive Behavior 前攝行為
Proactive Behavior 前攝行為Proactive Behavior 前攝行為
Proactive Behavior 前攝行為
 
聰明人必做的十件事
聰明人必做的十件事聰明人必做的十件事
聰明人必做的十件事
 
早晨的第一杯
早晨的第一杯早晨的第一杯
早晨的第一杯
 
再別康橋及牛津
再別康橋及牛津再別康橋及牛津
再別康橋及牛津
 
海洋垃圾
海洋垃圾海洋垃圾
海洋垃圾
 
北越下龍灣
北越下龍灣北越下龍灣
北越下龍灣
 
生命的勇氣
生命的勇氣生命的勇氣
生命的勇氣
 
一位老師的告白
一位老師的告白一位老師的告白
一位老師的告白
 
品格教育.天下
品格教育.天下品格教育.天下
品格教育.天下
 
Dizzle
DizzleDizzle
Dizzle
 
台南小吃呷透透
台南小吃呷透透台南小吃呷透透
台南小吃呷透透
 
三則感人小故事
三則感人小故事三則感人小故事
三則感人小故事
 
我們這一代
我們這一代我們這一代
我們這一代
 
最高境界
最高境界最高境界
最高境界
 

Último

Call Girls Nagpur Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Nagpur Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Nagpur Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Nagpur Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Call Girls Darjeeling Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Darjeeling Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Darjeeling Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Darjeeling Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Call Girl Coimbatore Prisha☎️ 8250192130 Independent Escort Service Coimbatore
Call Girl Coimbatore Prisha☎️  8250192130 Independent Escort Service CoimbatoreCall Girl Coimbatore Prisha☎️  8250192130 Independent Escort Service Coimbatore
Call Girl Coimbatore Prisha☎️ 8250192130 Independent Escort Service Coimbatorenarwatsonia7
 
Low Rate Call Girls Kochi Anika 8250192130 Independent Escort Service Kochi
Low Rate Call Girls Kochi Anika 8250192130 Independent Escort Service KochiLow Rate Call Girls Kochi Anika 8250192130 Independent Escort Service Kochi
Low Rate Call Girls Kochi Anika 8250192130 Independent Escort Service KochiSuhani Kapoor
 
Call Girls Ludhiana Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Call Girls Service Surat Samaira ❤️🍑 8250192130 👄 Independent Escort Service ...
Call Girls Service Surat Samaira ❤️🍑 8250192130 👄 Independent Escort Service ...Call Girls Service Surat Samaira ❤️🍑 8250192130 👄 Independent Escort Service ...
Call Girls Service Surat Samaira ❤️🍑 8250192130 👄 Independent Escort Service ...CALL GIRLS
 
Call Girls Service Jaipur Grishma WhatsApp ❤8445551418 VIP Call Girls Jaipur
Call Girls Service Jaipur Grishma WhatsApp ❤8445551418 VIP Call Girls JaipurCall Girls Service Jaipur Grishma WhatsApp ❤8445551418 VIP Call Girls Jaipur
Call Girls Service Jaipur Grishma WhatsApp ❤8445551418 VIP Call Girls Jaipurparulsinha
 
VIP Call Girls Tirunelveli Aaradhya 8250192130 Independent Escort Service Tir...
VIP Call Girls Tirunelveli Aaradhya 8250192130 Independent Escort Service Tir...VIP Call Girls Tirunelveli Aaradhya 8250192130 Independent Escort Service Tir...
VIP Call Girls Tirunelveli Aaradhya 8250192130 Independent Escort Service Tir...narwatsonia7
 
Artifacts in Nuclear Medicine with Identifying and resolving artifacts.
Artifacts in Nuclear Medicine with Identifying and resolving artifacts.Artifacts in Nuclear Medicine with Identifying and resolving artifacts.
Artifacts in Nuclear Medicine with Identifying and resolving artifacts.MiadAlsulami
 
Bangalore Call Girls Hebbal Kempapura Number 7001035870 Meetin With Bangalor...
Bangalore Call Girls Hebbal Kempapura Number 7001035870  Meetin With Bangalor...Bangalore Call Girls Hebbal Kempapura Number 7001035870  Meetin With Bangalor...
Bangalore Call Girls Hebbal Kempapura Number 7001035870 Meetin With Bangalor...narwatsonia7
 
Call Girls Ooty Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Ooty Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Ooty Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Ooty Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
High Profile Call Girls Coimbatore Saanvi☎️ 8250192130 Independent Escort Se...
High Profile Call Girls Coimbatore Saanvi☎️  8250192130 Independent Escort Se...High Profile Call Girls Coimbatore Saanvi☎️  8250192130 Independent Escort Se...
High Profile Call Girls Coimbatore Saanvi☎️ 8250192130 Independent Escort Se...narwatsonia7
 
Book Paid Powai Call Girls Mumbai 𖠋 9930245274 𖠋Low Budget Full Independent H...
Book Paid Powai Call Girls Mumbai 𖠋 9930245274 𖠋Low Budget Full Independent H...Book Paid Powai Call Girls Mumbai 𖠋 9930245274 𖠋Low Budget Full Independent H...
Book Paid Powai Call Girls Mumbai 𖠋 9930245274 𖠋Low Budget Full Independent H...Call Girls in Nagpur High Profile
 
Bangalore Call Girls Nelamangala Number 7001035870 Meetin With Bangalore Esc...
Bangalore Call Girls Nelamangala Number 7001035870  Meetin With Bangalore Esc...Bangalore Call Girls Nelamangala Number 7001035870  Meetin With Bangalore Esc...
Bangalore Call Girls Nelamangala Number 7001035870 Meetin With Bangalore Esc...narwatsonia7
 
Best Rate (Hyderabad) Call Girls Jahanuma ⟟ 8250192130 ⟟ High Class Call Girl...
Best Rate (Hyderabad) Call Girls Jahanuma ⟟ 8250192130 ⟟ High Class Call Girl...Best Rate (Hyderabad) Call Girls Jahanuma ⟟ 8250192130 ⟟ High Class Call Girl...
Best Rate (Hyderabad) Call Girls Jahanuma ⟟ 8250192130 ⟟ High Class Call Girl...astropune
 
Chandrapur Call girls 8617370543 Provides all area service COD available
Chandrapur Call girls 8617370543 Provides all area service COD availableChandrapur Call girls 8617370543 Provides all area service COD available
Chandrapur Call girls 8617370543 Provides all area service COD availableDipal Arora
 
VIP Service Call Girls Sindhi Colony 📳 7877925207 For 18+ VIP Call Girl At Th...
VIP Service Call Girls Sindhi Colony 📳 7877925207 For 18+ VIP Call Girl At Th...VIP Service Call Girls Sindhi Colony 📳 7877925207 For 18+ VIP Call Girl At Th...
VIP Service Call Girls Sindhi Colony 📳 7877925207 For 18+ VIP Call Girl At Th...jageshsingh5554
 
Kesar Bagh Call Girl Price 9548273370 , Lucknow Call Girls Service
Kesar Bagh Call Girl Price 9548273370 , Lucknow Call Girls ServiceKesar Bagh Call Girl Price 9548273370 , Lucknow Call Girls Service
Kesar Bagh Call Girl Price 9548273370 , Lucknow Call Girls Servicemakika9823
 
Call Girls Coimbatore Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Coimbatore Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Coimbatore Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Coimbatore Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Call Girls Bhubaneswar Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Bhubaneswar Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Bhubaneswar Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Bhubaneswar Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 

Último (20)

Call Girls Nagpur Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Nagpur Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Nagpur Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Nagpur Just Call 9907093804 Top Class Call Girl Service Available
 
Call Girls Darjeeling Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Darjeeling Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Darjeeling Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Darjeeling Just Call 9907093804 Top Class Call Girl Service Available
 
Call Girl Coimbatore Prisha☎️ 8250192130 Independent Escort Service Coimbatore
Call Girl Coimbatore Prisha☎️  8250192130 Independent Escort Service CoimbatoreCall Girl Coimbatore Prisha☎️  8250192130 Independent Escort Service Coimbatore
Call Girl Coimbatore Prisha☎️ 8250192130 Independent Escort Service Coimbatore
 
Low Rate Call Girls Kochi Anika 8250192130 Independent Escort Service Kochi
Low Rate Call Girls Kochi Anika 8250192130 Independent Escort Service KochiLow Rate Call Girls Kochi Anika 8250192130 Independent Escort Service Kochi
Low Rate Call Girls Kochi Anika 8250192130 Independent Escort Service Kochi
 
Call Girls Ludhiana Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 9907093804 Top Class Call Girl Service Available
 
Call Girls Service Surat Samaira ❤️🍑 8250192130 👄 Independent Escort Service ...
Call Girls Service Surat Samaira ❤️🍑 8250192130 👄 Independent Escort Service ...Call Girls Service Surat Samaira ❤️🍑 8250192130 👄 Independent Escort Service ...
Call Girls Service Surat Samaira ❤️🍑 8250192130 👄 Independent Escort Service ...
 
Call Girls Service Jaipur Grishma WhatsApp ❤8445551418 VIP Call Girls Jaipur
Call Girls Service Jaipur Grishma WhatsApp ❤8445551418 VIP Call Girls JaipurCall Girls Service Jaipur Grishma WhatsApp ❤8445551418 VIP Call Girls Jaipur
Call Girls Service Jaipur Grishma WhatsApp ❤8445551418 VIP Call Girls Jaipur
 
VIP Call Girls Tirunelveli Aaradhya 8250192130 Independent Escort Service Tir...
VIP Call Girls Tirunelveli Aaradhya 8250192130 Independent Escort Service Tir...VIP Call Girls Tirunelveli Aaradhya 8250192130 Independent Escort Service Tir...
VIP Call Girls Tirunelveli Aaradhya 8250192130 Independent Escort Service Tir...
 
Artifacts in Nuclear Medicine with Identifying and resolving artifacts.
Artifacts in Nuclear Medicine with Identifying and resolving artifacts.Artifacts in Nuclear Medicine with Identifying and resolving artifacts.
Artifacts in Nuclear Medicine with Identifying and resolving artifacts.
 
Bangalore Call Girls Hebbal Kempapura Number 7001035870 Meetin With Bangalor...
Bangalore Call Girls Hebbal Kempapura Number 7001035870  Meetin With Bangalor...Bangalore Call Girls Hebbal Kempapura Number 7001035870  Meetin With Bangalor...
Bangalore Call Girls Hebbal Kempapura Number 7001035870 Meetin With Bangalor...
 
Call Girls Ooty Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Ooty Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Ooty Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Ooty Just Call 9907093804 Top Class Call Girl Service Available
 
High Profile Call Girls Coimbatore Saanvi☎️ 8250192130 Independent Escort Se...
High Profile Call Girls Coimbatore Saanvi☎️  8250192130 Independent Escort Se...High Profile Call Girls Coimbatore Saanvi☎️  8250192130 Independent Escort Se...
High Profile Call Girls Coimbatore Saanvi☎️ 8250192130 Independent Escort Se...
 
Book Paid Powai Call Girls Mumbai 𖠋 9930245274 𖠋Low Budget Full Independent H...
Book Paid Powai Call Girls Mumbai 𖠋 9930245274 𖠋Low Budget Full Independent H...Book Paid Powai Call Girls Mumbai 𖠋 9930245274 𖠋Low Budget Full Independent H...
Book Paid Powai Call Girls Mumbai 𖠋 9930245274 𖠋Low Budget Full Independent H...
 
Bangalore Call Girls Nelamangala Number 7001035870 Meetin With Bangalore Esc...
Bangalore Call Girls Nelamangala Number 7001035870  Meetin With Bangalore Esc...Bangalore Call Girls Nelamangala Number 7001035870  Meetin With Bangalore Esc...
Bangalore Call Girls Nelamangala Number 7001035870 Meetin With Bangalore Esc...
 
Best Rate (Hyderabad) Call Girls Jahanuma ⟟ 8250192130 ⟟ High Class Call Girl...
Best Rate (Hyderabad) Call Girls Jahanuma ⟟ 8250192130 ⟟ High Class Call Girl...Best Rate (Hyderabad) Call Girls Jahanuma ⟟ 8250192130 ⟟ High Class Call Girl...
Best Rate (Hyderabad) Call Girls Jahanuma ⟟ 8250192130 ⟟ High Class Call Girl...
 
Chandrapur Call girls 8617370543 Provides all area service COD available
Chandrapur Call girls 8617370543 Provides all area service COD availableChandrapur Call girls 8617370543 Provides all area service COD available
Chandrapur Call girls 8617370543 Provides all area service COD available
 
VIP Service Call Girls Sindhi Colony 📳 7877925207 For 18+ VIP Call Girl At Th...
VIP Service Call Girls Sindhi Colony 📳 7877925207 For 18+ VIP Call Girl At Th...VIP Service Call Girls Sindhi Colony 📳 7877925207 For 18+ VIP Call Girl At Th...
VIP Service Call Girls Sindhi Colony 📳 7877925207 For 18+ VIP Call Girl At Th...
 
Kesar Bagh Call Girl Price 9548273370 , Lucknow Call Girls Service
Kesar Bagh Call Girl Price 9548273370 , Lucknow Call Girls ServiceKesar Bagh Call Girl Price 9548273370 , Lucknow Call Girls Service
Kesar Bagh Call Girl Price 9548273370 , Lucknow Call Girls Service
 
Call Girls Coimbatore Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Coimbatore Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Coimbatore Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Coimbatore Just Call 9907093804 Top Class Call Girl Service Available
 
Call Girls Bhubaneswar Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Bhubaneswar Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Bhubaneswar Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Bhubaneswar Just Call 9907093804 Top Class Call Girl Service Avail...
 

HIPAA2

  • 1. Introduction to Health Insurance Portability and Accountability Act (HIPAA) Privacy and Security Rules Speaker: Chenyu Lee 1
  • 2. HIPAA Background • 1996. Health Insurance Portability and Accountability Act (HIPAA), Public Law 104-191. – Department of Health and Human Services (HHS) adopts national standards for electronic health care transactions and code sets, unique health identifiers, and security. • 2009. Health Information Technology for Economic and Clinical Health Act (HITECH) enacted as part of the American Recovery and Reinvestment Act of 2009 (ARRA). • 2010. Patient Protection and Affordable Care Act of 2010 (ACA). • 2013. HIPAA Omnibus Rule makes changes to existing privacy, security and breach notification requirements. 2
  • 3. HIPAA Regulations • CFR 45 PART 160: General administrative requirements • CFR 45 PART 162: Administrative requirements • CFR 45 PART 164: Security and privacy rules 3
  • 5. Business Associate • Business Associate includes the partners that may provide legal, actuarial, accounting, consulting, data aggregation, management, administration or financial services wherein the services require the disclosure of individually identifiable health information. • A key concern, among many, is that some software vendors almost certainly will be categorized as Business Associates. 5
  • 6. Covered Entity & Electronic Media • Covered Entity means: – A health plan – A health care clearinghouse – A health care provider who transmits any health information in electronic form in connection with a transaction covered by this subchapter. • Electronic media means: – Electronic storage material on which data is or may be recorded electronically. – Transmission media used to exchange information already in electronic storage media. 6
  • 7. Health Care & Health Care Provider & Health information • Health care means: – Care, services, or supplies related to the health of an individual. • Health care provider means: – A provider of medical or health services, and any other person or organization who furnishes, bills, or is paid for health care in the normal course of business. • Health information means: – Any information, whether oral or recorded in any form or medium. 7
  • 8. Individual & Individually Identifiable Health Information & Protected Health Information (PHI) • Individual means: – The person who is the subject of protected health information. • Individually identifiable health information that – Identifies the individual – Or with respect to which there is a reasonable basis to believe the information can be used to identify the individual. • Protected health information means: – Individually identifiable health information that is • Transmitted by electronic media • Maintained in electronic media • Transmitted or maintained in any other form or medium 8
  • 9. PHI Includes One or More of Identifiers (§164.514(b)(2)(i)) – Names – Addresses including Zip Codes – All Dates – Telephone & Fax Numbers – Email Addresses – Social Security Numbers – Medical Record Numbers – Health Plan Numbers – License Numbers – Vehicle Identification Numbers – Account Numbers – Biometric Identifiers – Full Face Photos – Any Other Unique Identifying Number, Characteristic, or Code 9
  • 10. Use and Disclosure of PHI • Use of PHI refers to how PHI is internally accessed, shared and utilized by the covered entity that maintains such information. • Disclosure of PHI refers to how PHI is shared with individuals or entities externally. 10
  • 11. Notice of Privacy Practices (NPP) • Notice of Privacy Practices means: – Providers and Health Plans must have a Notice of Privacy Practices (NPP) • It provides a detailed description of the various uses and disclosures of PHI that are permissible without obtaining a patient’s authorization. – In general, anytime you release patient information for a reason unrelated to treatment, payment (e.g., billing) or healthcare operations (TPO), an authorization is required. 11
  • 12. Treatment, Payment and Operations (TPO) • Treatment: Various activities related to patient care. • Payment: Various activities related to paying for or getting paid for health care services. • Health Care Operations: Generally refers to day-to-day activities of a covered entity, such as planning, management, training, improving quality, providing services, and education. • NOTE: – Research is not considered TPO. – Written patient authorization is required to access PHI for research unless authorization waiver is approved by the Institutional Review Board (IRB). 12
  • 14. General Rule (§164.306) • General requirements: – Ensure the confidentiality, integrity, and availability of all its ePHI. – Protect against any reasonably anticipated threats or hazards of its ePHI. – Protect against any reasonably anticipated uses or disclosures of ePHI not permitted. • Implementation specifications. – Required specifications must be implemented. – Addressable specifications must be assessed and implemented as specified if reasonable and appropriate to the Covered Entity. • Maintenance. 14
  • 15. Administrative Safeguards (§164.308(a)) – Security management process – Assigned security responsibility – Workforce security – Information access management – Security awareness and training – Security incident procedures – Contingency plan – Evaluation 15
  • 16. Physical Safeguards (§164.310) • Facility access controls. • Workstation use. • Workstation security. • Device and media controls. 16
  • 17. Policies and Procedures and Documentation Requirements. (§164.316(b)(2)) • Time limit. – Retain the documentation required for 6 years from the date of its creation or the date when it last was in effect, whichever is later. • Availability • Updates 17
  • 18. Technical Safeguards (§164.312) • Access control. • Audit controls. • Integrity. • Person or entity authentication. • Transmission security. 18
  • 20. Required/Addressable Specifications of Security Standards Standards Specifications Sections Risk Analysis 164.308(a)(1)(ii)(A) Risk Management 164.308(a)(1)(ii)(B) Sanction Policy 164.308(a)(1)(ii)(C) Information System Activity Review 164.308(a)(1)(ii)(D) Assigned Security Responsibility Assigned Security Responsibility 164.308(a)(2) Authorization and/or Supervision 164.308(a)(3)(ii)(A) Workforce Clearance Procedure 164.308(a)(3)(ii)(B) Termination Procedures 164.308(a)(3)(ii)(C) Isolating Health care Clearinghouse Function 164.308(a)(4)(ii)(A) Access Authorization 164.308(a)(4)(ii)(B) Access Establishment and Modification 164.308(a)(4)(ii)(C) Security Reminders 164.308(a)(5)(ii)(A) Log-in Monitoring 164.308(a)(5)(ii)(B) Protection from Malicious Software 164.308(a)(5)(ii)(C) Password Management 164.308(a)(5)(ii)(D) Security Incident Procedures Response and Reporting 164.308(a)(6) Data Backup Plan 164.308(a)(7)(ii)(A) Disaster Recovery Plan 164.308(a)(7)(ii)(B) Emergency Mode Operation Plan 164.308(a)(7)(ii)(C) Testing and Revision Procedure 164.308(a)(7)(ii)(D) Applications and Data Criticality Analysis 164.308(a)(7)(ii)(E) Evaluation Evaluation 164.308(a)(8) Business Associate Contracts and Other Arrangement Written Contract or Other Arrangement 164.308(b)(3) Security Management Process Workforce Security Information Access Mangement Security Awareness and Training Contingency Plan 20
  • 21. Required/Addressable Specifications of Security Standards Standards Specifications Sections Contingency Operations 164.310(a)(2)(i) Facility Security Plan 164.310(a)(2)(ii) Access Control and Validation Procedures 164.310(a)(2)(iii) Maintenance Records 164.310(a)(2)(iv) Workstation Use Workstation Use 164.310(b) Workstation Security Workstation Security 164.310(c) Disposal 164.310(d)(2)(i) Media Re-use 164.310(d)(1)(2)(ii) Accountability 164.310(d)(2)(iii) Data Backup and Storage 164.310(d)(2)(iv) Unique User Identification 164.312(a)(2)(i) Emergency Access Procedure 164.312(a)(2)(ii) Automatic Logoff 164.312(a)(2)(iii) Encryption and Decryption 164.312(a)(2)(iv) Audit Controls Audit Controls 164.312(b) Integrity Mechanism to Authenticate Electronic Protecte164.312(c)(1) Person or Entity Authentication Person or Entity Authentication 164.312(d) Integrity Controls 164.312(e)(2)(i) Encryption 164.312(e)(2)(ii) Time Limit 164.316(b)(2)(i) Avilability 164.316(b)(2)(ii) Update 164.316(b)(2)(iii) Documentation Device and Media Control Access Control Transmission Security Facility Access Control 21
  • 22. Minimum Necessary Rule (§164.502(b)) • Generally, the amount of PHI used, shared, accessed or requested must be limited to only what is needed. • Workers should access or use only the PHI necessary to carry out their job responsibilities. 22
  • 23. Authorization (§164.508) • A covered entity may not use or disclose protected health information for reasons generally not related to treatment, payment or healthcare operations without an authorization. • The Authorization must include: – A detailed description of the PHI to be disclosed, who will make the disclosure, to whom the disclosure will be made, expiration date, the purpose of the disclosure, and signature. – The individual's right to revoke, the ability or inability to condition usage, and the potential for information disclosed. 23
  • 24. Types of Disclosures • No Authorization Required (§ 164.512) • Authorization Required, but Must Give Opportunity to Object (§ 164.510) • Authorization Required (§ 164.508) 24
  • 25. Uses and Disclosures for Which An Authorization or Opportunity to Agree or Object Is Not Required • To disclose PHI to the patient (§ 164.502) • To use or disclose PHI for treatment, payment or healthcare operations. (§ 164.502) • Certain disclosures required by law (for example, public health reporting of diseases, child abuse/neglect cases, etc.) (§ 164.512(a)-(l)) 25
  • 26. Uses and Disclosures for Which An Authorization Is Required • A covered entity may not use or disclose protected health information without an authorization. (§ 164.508(a)(1)) • To access, use or disclose PHI for research (§ 164.512(i)(1)(i)) • For marketing activities and sale of PHI (§ 164.508(a)(3)) 26
  • 27. Uses and Disclosures Requiring An Opportunity for The Individual to Agree or to Object • The Patient must be offered an opportunity to object before discussing PHI with a patient’s family or friends. (§ 164.510(b)(1)(i)) • Limited PHI (e.g., patient’s hospital room/location number) is included in the “Hospital Directory” but patients are offered an “Opt Out” opportunity and certain disclosures to clergy members. (§ 164.510(b)(3)) • Exception: Emergency circumstances (§ 164.510(a)(3)) 27
  • 28. Breach (§164.402(b)) • Breach means the acquisition, access, use, or disclosure of protected health information in a manner not permitted under privacy rules. • Amount of a civil money penalty. – In the amount of less than $100 or more than $50,000 for each violation – In excess of $1,500,000 for identical violations during a calendar year • Criminal Liability – Offenses committed with the intent to sell, transfer, or use individually identifiable health information for commercial advantage, personal gain or malicious harm permit fines of $250,000 and imprisonment for up to ten years. 28
  • 29. Companies & Fines Entity Fined Fine Violation CIGNET (Feb, 2011) $4,300,000 Online database application error. Alaska Department of Health and Human Services (June, 2012) $1,700,000 Unencrypted USB hard drive stolen, poor policies and risk analysis. WellPoint (Sep, 2012) $1,700,000 Did not have technical safeguards in place to verify the person/entity seeking access to PHI in the database. Failed to conduct a technical evaluation in response to software upgrade. Blue Cross Blue Shield of Tennessee (Mar, 2012) $1,500,000 57 unencrypted hard drives stolen. Massachusetts Eye and Ear Infirmary and Massachusetts Eye and Ear Associates (Sep, 2012) $1,500,000 Unencrypted laptop stolen, poor risk analysis, policies. Affinity Health Plan (Aug, 2013) $1,215,780 Returned photocopiers without erasing the hard drives. South Shore Hospital (May, 2012) $750,000 Backup tapes went missing on the way to contractor. Idaho State University (May, 2013) $400,000 Breach of unsecured ePHI. 29