SlideShare uma empresa Scribd logo
1 de 36
1
HASPI approved
HIPAA TRAINING
MODULE
UCSD Health Sciences
February 25, 2010
This training module satisfies Federal laws which mandate workforce privacy / security training at the
time of hire and UC policy for annual privacy training for Health Insurance Portability and
Accountability Act (HIPAA) and the California Confidentiality of Medical Information Act (CMIA)
2
Who must complete privacy /
security training?
 Anyone who works with or may see health, financial, or confidential
information with personal identifiers
 Anyone who uses a computer or electronic device to store and/or
transmit personal or health information
 Such as:
 Medical Center / Medical Group employees
 Schools of Medicine / Pharmacy employees, health professions trainees
 Campus administrative & technical staff who work in clinical areas
 Volunteers (Including Volunteer Clinical Faculty)
 Students who work in patient care areas
 Research staff and investigators
 Accounting, Payroll and Benefits staff
 Other independent contractors with access to personal / health
information who assist healthcare employees with their job
3
Objectives
 Understand what information must be protected under state and federal
privacy laws
 Understand your role in maintaining privacy and security of protected
health information (PHI)
 Understand what rights patients have regarding access and use of
medical information
 Understand your role with adhering to data security standards and
responsibility for reporting incidents
 Understand the consequences and risks of individual penalties for non-
compliance
4
 HIPAA: Health Insurance Portability and
Accountability Act of 1996. The purpose of the
law was to make health insurance more efficient
and portable.
 Because of public concerns about confidentiality,
it also addressed information protection.
Privacy Standards:
April 2003
Protect an individual’s
health information and
provide patients with certain
rights
Security Standards:
Final Rule Published
February 20, 2003
Physical, technical and
administrative safeguards of
patient information that is
stored electronically.
(Effective: 2005)
Codes and Transaction
Standards:
October 2003
Standardization for electronic
billing and claims
management.
HIPAA
5
Confidentiality of Medical
Information Act (CMIA)
 CMIA prohibits disclosure of “medical information”
without prior authorization unless permitted by
law.
 (California Civil Code 56.10)
 Medical information means any individually
identifiable information in the possession of or
derived from a provider of health care regarding a
patient’s medical history, mental or physical
condition, or treatment.
 (California Civil Code 56.05(g))
6
What information must you
protect? PHI
 Protected health information (PHI) is any personal or
health information created or maintained in the course
of providing treatment, obtaining payment for services,
or while engaged in health care operations including
teaching and research activities.
 Common examples of PHI include:
 Medical records, test results and treatment plans
 Billing records, referral authorizations and health
insurance information
 Name, address, social security number and
photographs
7
To the Patient, It’s All
Confidential Information
 Patient Personal Information
 Patient Financial Information
 Patient Medical Information
 Written, Spoken, Electronic PHI
 Patient Information may be
accessed, used, or disclosed only
to do your job
8
Requirements before PHI is Used
or Disclosed
 In order to use or disclose PHI:
 The healthcare institution must give each patient a
“Notice of Privacy Practices” that:
 Describes how the institution may use and disclose
the patient’s protected health information (PHI) and
 Advises the patient of his/her privacy rights
 The healthcare institution must attempt to obtain a
patient’s signature acknowledging receipt of the Notice,
except in emergency situations. If a signature is not
obtained, the healthcare institution must document the
reason.
 The healthcare institution must provide privacy / security
training to its workforce.
9
Employee Access to Protected
Health Information (PHI)
 Patient information is confidential and shall not
be accessed or viewed other than for the sole
purpose of performing employment duties and
responsibilities
 Accessing a record, including your own or
that of a family member or friend without
a work purpose is a violation of policy
 Inappropriate access to patient information may
result in disciplinary action up to and including
termination as well as individual fines.
10
You may…
 Look at a patient’s PHI only if you need to do so
for your job
 Use a patient’s PHI only if you need to do so for
your job
 Disclose a patient’s PHI to others only when it
is necessary for others to do their job
 Limit your access, use and disclosure of PHI to
the minimum necessary information needed to
perform your job.
11
PHI may be Used and Disclosed
for the Following Purposes:
 Treatment:
 We may use and disclose medical information about a
patient to health system doctors, nurses, technicians,
students or providers who are involved in the patient’s
care
 Payment:
 We may use and disclose medical information about
the patient so that the treatment and services received
may be billed and payment may be collected.
 Operations:
 We may use and disclose medical information for
teaching, medical staff peer review, legal purposes,
internal auditing, to conduct customer service surveys,
and general business management
12
Other Permitted Uses and
Disclosures
 For appointment reminders
 Take care to avoid leaving messages on answering
machines which disclose sensitive information.
 To provide treatment alternatives
 To provide limited information about patients for the
hospital directory
 To assist other individuals involved in the patient’s care
(e.g., friends, family, etc.), if determined to be in the
patient’s best interest.
 For disaster relief efforts
 For research (with HRPP / IRB approval)
 For fundraising, using limited demographic
13
Other Permitted Uses and
Disclosures
 To avert serious threat to
health and safety
 For organ and tissue
procurement, reimplantation, or
banking purposes
 To military command authorities
about armed forces patients
 To workers’ compensation
programs (minimum necessary)
 For public health
disclosures
 For government oversight
activities
 To law enforcement, for
certain activities
 To coroners, medical examiners
and funeral directors
 For national security and
intelligence activities
 To correctional institutions about
inmates
 For certain legal proceedings,
lawsuits and other legal activities
 To business associates with a
written business associate
agreement
14
Examples of Permitted Uses and
Disclosures
 To avert a serious threat to health or
safety: PHI may be used to prevent or
lessen a serious and imminent threat to a
person or the public.
 Public-health disclosures: PHI may be
used to report data to prevent or control
disease, injury or disability as required by law
(e.g., reporting of disease, injury, vital events
such as birth or death).
15
Continued Examples of Permitted
Uses and Disclosures
 Government health oversight activities: PHI may be used for
government or certification audits: civil, administrative, or criminal
investigations or proceedings; or licensure or disciplinary action
 Law enforcement: PHI may be used to report suspected abuse, neglect
or domestic violence; death resulting from criminal conduct; criminal
conduct occurring on premises; or limited PHI for identifying or
apprehending a suspect, witness or missing person
 Individuals involved in the patient’s care or payment of care:
PHI may be disclosed to a family member, relative (or anyone identified by
the patient as involved in the patient’s medical care or assisting in paying
for a patient’s medical care), IF…
 The patient agrees or had an opportunity to object to the disclosure, and did not;
or
 Based on the exercise of professional judgment, it appears that the patient
would not object to the disclosure; or
 In cases where the patient is not present or incapacitated, the disclosure is in
the best interests of the patient, based on the exercise of professional judgment.
16
Continued Examples of Permitted
Uses and Disclosures:
 A provider may use PHI to communicate to a
patient about a product or service that UCSD
Medical Center provides.
 A provider may use PHI to communicate to a
patient about general health issues, e.g.,
disease prevention, wellness classes, etc.
For all other marketing communications,
a patient’s written authorization is
required
17
Continued Examples of Permitted
Uses and Disclosures:
 Staff may only use demographic information (name,
address, age, type of medical insurance) and dates of
service for fundraising without authorization. (Disease,
diagnosis or condition may not be used to develop a
fundraising list.)
 Staff must obtain a patient’s written authorization to use
any other PHI for fundraising
 All fundraising materials must provide the recipient with
a way to opt out of receiving any additional fundraising
material
18
Continued Examples of Permitted
Uses and Disclosures: Research
 De-identified PHI. Aggregate data (stripped of all 18
identifiers) may be used and disclosed for research purposes
without prior authorization, e.g., work preparatory to research /
feasibility assessment
 Limited Data Set of PHI. With the removal of PHI direct
identifiers (name, address, SSN, account number and other
identifiers), a limited data set may be used and disclosed if a
Data Use Agreement or another appropriate agreement is in
place.
 Limited data set may include “indirect identifiers” (dates, age, zip codes)
 PHI. In order to access or use PHI restricted databases for
research purposes, the researcher must obtain appropriate IRB
approval of the research protocol and the subject’s consent or an
IRB waiver of authorization.
19
Continued Examples of Permitted
Uses and Disclosures:
 Staff may disclose PHI to a 3rd
party Business Associate to assist
the healthcare institution to do its job as long as a Business
Associate Agreement (BAA) is in place
 Examples of “business associates”:
 Medical transcription and billing vendors
 Vendors assisting with medical account receivables
 Attorneys, consultants, data aggregation services
 Other vendors if they require access to PHI to assist healthcare
institution with health care functions
 Refer requests for BAA agreements to the appropriate UC office
for review and authorized signature, e.g., Purchasing,
Contracting.
20
All Other Uses of PHI Require
Written Authorization
 HIPAA has very specific requirements for the
written authorization. It must:
 Describe the PHI to be released
 Identify who may release the PHI
 Identify who may receive the PHI
 Describe the purposes of the disclosure
 Identify when the authorization expires
 Be signed by the patient / patient representative
21
Examples of Circumstances
when Patient Authorization is
Required
 Medical Records:
 For the use and disclosure of medical information or
records when that information is being provided / sent to
someone other than the patient (e.g., patient’s employer,
friend, family, lawyer, accountant, etc.)
 Media Communications:
 For the use and disclosure to the media or for other types
of external communications that contain PHI
 Marketing and Other Products:
 For the use and disclosure of a patient’s PHI to
pharmaceutical or medical device companies, non-profit
organizations, etc.
 Fundraising
 For the use and disclosure of a patient’s PHI, other than
demographic information
22
UCSDMC Authorization Form:
General
23
HIPAA Gives the Patient Specific
Privacy Rights
 Patients have a right to request restriction of PHI
uses and disclosures. Restrictions should not be
granted by faculty or staff without consulting the
Privacy Officer.
 Patients have a right to request confidential forms of
communications (mail to the P.O. Box not street
address, no messages on answering machines, etc.).
 Patients have a right to access and receive a copy of
their medical record.
 Patients have a right to an accounting of the
disclosures of their PHI.
 Patients have a right to request amendments to their
medical record.
24
Federal/State Privacy & Security
Laws Require…
 Providers of health care to implement administrative,
physical and technical safeguards to:
 Ensure the confidentiality and privacy of medical
information
 Protect against reasonably anticipated threats or
unauthorized uses or disclosures of PHI (45 CFR 164.306)
 Safeguard patient medical information from unauthorized
or unlawful access, use or disclosure
 Implement policies and procedures to prevent, detect,
contain, and correct security violations (45 CFR 164.308)
25
Privacy / Security:
Safeguards & Reminders
 Keep office(s) secured
 Password protect your computer
 Backup your electronic information
 Run updated anti-virus, anti-spam, and anti-spyware
software
 Keep removable media (e.g., CDs, DVDs, USB
attached drives) locked up
 In patient care settings, prevent ID theft by verifying the
patient’s identification at the time of service, e.g., driver
license, passport, government issued photo ID
 Report privacy complaints and security incidents and…
respond to incident reports promptly!
26
Good Computing Practices:
E-mail
 Don’t open, forward, or reply to
suspicious e-mails
 Don’t open suspicious e-mail
attachments or click on unknown
website addresses
 Don’t download unknown or unsolicited
programs
 Delete spam
27
Good Computing Practices:
Passwords
 Use long, cryptic passwords that can’t be easily
guessed
 Protect your passwords -- don’t write them
down
 Never share your passwords
28
Good Computing Practices:
Workstation Security
 Physically secure your area and data when
unattended
 Encrypt files & portable devices containing
restricted data (e.g., laptops, memory / USBs) to 128+
 Secure laptop computers with a lockdown
cable
 Never share your access code, card or key
 Lock your screen or log-off from restricted
systems
29
Good Computing Practices:
Portable Device Security
 Don’t keep confidential data on
portable devices, unless it is
absolutely necessary
 Back-up data on portable devices to your
department’s secure server
 Encrypt (128+) and/or password protect all
devices
 Encryption is a process that renders electronic information
unusable, unreadable or indecipherable without the key.
30
Good Computing Practices:
Data Management
 Know where PHI / restricted data is stored
 Destroy confidential data which is no longer
needed
 Shred or otherwise destroy restricted data
 Erase information before disposing of or reusing
drives
 Protect confidential and restricted data that
you keep with back-ups to a departmental
server
31
Notice of Breach
Federal / State Privacy Laws:
 Require licensed health facilities (clinic, hospital,
home health agency, or hospice) to prevent and
report unlawful or unauthorized access to, and
use or disclosure of, patients' medical information. (Health
& Safety Code 1280.15)
 Violations must be reported to:
 California Department of Public Health (CDPH) -- no later
than five days after the unlawful or unauthorized access,
use, or disclosure has been detected; and to the federal
government.
 Patients – notification of violation or breach, e.g., snooping,
certain breaches of computerized data that contain
unencrypted personal information about the patient.
32
Penalties
 State / Federal Privacy Laws:
 Agencies may assess fines and civil penalties against
any individual or provider of health care
 Penalties range from $2,500 - $250,000 per
occurrence (or higher), depending on the circumstances.
Repeat violations and violations for financial gain are
assessed higher penalties.
 Violations may also be reported to the licensing board
 California law permits civil suits against the individual
33
Reporting Privacy and Security
Breaches
 Examples of reportable incidents and
violations:
 Any employee accessing patient information for
non-work purposes
 Loss / theft of computers, portable devices that
contain unencrypted health information or
personally identified information
 Any loss / theft of medical records, films, etc.
 Any complaints related to suspected identity theft
or medical identify theft
34
Questions about Privacy /
Security?
 Sonia Lira, HASPI Industry Coordinator
 Sonia.lira@gcccd.edu
 Janet Hoff, HASPI Program Manager
 Janet.hoff@gcccd.edu
 Heather Peterson, HASPI Curriculum
Coordinator
 Hpeterson@guhsd.net
35
Confidentiality Statement
 The protection of health and other confidential information is a right protected by
law and enforced by individual and institutional fines, criminal penalties as well as
healthcare policy. Safeguarding confidential information is a fundamental obligation
for all employees, clinical faculty, house staff, students and volunteers.
 I understand and acknowledge that:
1. I shall protect the privacy and security of confidential information at all times, both during
and after my participation in a RAHSI health pathway program.
2. I agree to (a) access, use, or view confidential information to the minimum extent
necessary for my assigned duties; and (b) disclose such information only to persons
authorized to receive it.
3. Inappropriate access and unauthorized release of protected information will result in
disciplinary action, up to and including termination of employment, and will result in a report
to authorities charged with professional licensing, enforcement of privacy laws and
prosecution of criminal acts. The Office of Health Information Integrity (OHII) may levy
penalties to individuals or providers of healthcare of $2,500 - $25,000 per violation.
4. User IDs cannot be shared. Inappropriate use of my ID (whether by me or anyone else) is
my responsibility and exposes me to severe consequences.
Print Name: ______________________________________________/ Date: ____________
36
Certification of HIPAA Training
I have read the Privacy / Security training materials
and confidentiality statement and understand the
Federal / State privacy laws.
 Print name: ____________________________________
 Sign name: ____________________________________
 School
name:___________________________________
 Student number: _______________________<if known>
 Health Pathway Courses Completed:
_____________________________________________
_____________________________________________

Mais conteúdo relacionado

Mais procurados

Medico Legal Aspects Of Prehospital Care
Medico Legal Aspects Of Prehospital CareMedico Legal Aspects Of Prehospital Care
Medico Legal Aspects Of Prehospital CareAshendu Pandey
 
Legal aspect of medical care
Legal aspect of medical careLegal aspect of medical care
Legal aspect of medical careNc Das
 
SCHS Topic 5: Privacy, Confidentiality and Medical Records
SCHS Topic 5: Privacy, Confidentiality and Medical RecordsSCHS Topic 5: Privacy, Confidentiality and Medical Records
SCHS Topic 5: Privacy, Confidentiality and Medical RecordsDr Ghaiath Hussein
 
Legal aspects of er nursing
Legal aspects of er nursingLegal aspects of er nursing
Legal aspects of er nursingTroy Pennington
 
Medical Negligence (ভুল চিকিৎসায় রোগীর মৃত্যু)
Medical Negligence (ভুল চিকিৎসায় রোগীর মৃত্যু)Medical Negligence (ভুল চিকিৎসায় রোগীর মৃত্যু)
Medical Negligence (ভুল চিকিৎসায় রোগীর মৃত্যু)drmainuddin
 
Lecture 13 privacy, confidentiality and medical records
Lecture 13 privacy, confidentiality and medical recordsLecture 13 privacy, confidentiality and medical records
Lecture 13 privacy, confidentiality and medical recordsDr Ghaiath Hussein
 
Forensic medicine medical negligence 2-bolam principle
Forensic medicine   medical negligence 2-bolam principleForensic medicine   medical negligence 2-bolam principle
Forensic medicine medical negligence 2-bolam principleMBBS IMS MSU
 
Legal & Regulatory Powerpoint
Legal & Regulatory PowerpointLegal & Regulatory Powerpoint
Legal & Regulatory PowerpointKendall Brune
 
Healthcare Information Privacy & Confidentiality: How To Work Very Well With ...
Healthcare Information Privacy & Confidentiality: How To Work Very Well With ...Healthcare Information Privacy & Confidentiality: How To Work Very Well With ...
Healthcare Information Privacy & Confidentiality: How To Work Very Well With ...Nawanan Theera-Ampornpunt
 
Medicolegal consideration
Medicolegal considerationMedicolegal consideration
Medicolegal considerationIAU Dent
 
Legal ethical issues & MLC
Legal ethical issues & MLCLegal ethical issues & MLC
Legal ethical issues & MLCHarpreet Kaur
 
MODULE 8 - PRIVACY AND CONFIDENTIALITY
MODULE 8 - PRIVACY AND CONFIDENTIALITYMODULE 8 - PRIVACY AND CONFIDENTIALITY
MODULE 8 - PRIVACY AND CONFIDENTIALITYDr Ghaiath Hussein
 
Confidentiality
ConfidentialityConfidentiality
Confidentialitywindleh
 
Legal aspects of med prac
Legal aspects of med pracLegal aspects of med prac
Legal aspects of med pracS A Tabish
 
Legal issues in emergency medicine
Legal issues in emergency medicineLegal issues in emergency medicine
Legal issues in emergency medicineSCGH ED CME
 
Legal aspects of nursing philnursingstudent
Legal aspects of nursing philnursingstudentLegal aspects of nursing philnursingstudent
Legal aspects of nursing philnursingstudentpinoy nurze
 
Medical Law and Ethics 4th Edition Fremgen Test Bank
Medical Law and Ethics 4th Edition Fremgen Test BankMedical Law and Ethics 4th Edition Fremgen Test Bank
Medical Law and Ethics 4th Edition Fremgen Test Banknofygisu
 

Mais procurados (20)

Medico Legal Aspects Of Prehospital Care
Medico Legal Aspects Of Prehospital CareMedico Legal Aspects Of Prehospital Care
Medico Legal Aspects Of Prehospital Care
 
Legal aspect of medical care
Legal aspect of medical careLegal aspect of medical care
Legal aspect of medical care
 
SCHS Topic 5: Privacy, Confidentiality and Medical Records
SCHS Topic 5: Privacy, Confidentiality and Medical RecordsSCHS Topic 5: Privacy, Confidentiality and Medical Records
SCHS Topic 5: Privacy, Confidentiality and Medical Records
 
Legal aspects of er nursing
Legal aspects of er nursingLegal aspects of er nursing
Legal aspects of er nursing
 
Medical Negligence (ভুল চিকিৎসায় রোগীর মৃত্যু)
Medical Negligence (ভুল চিকিৎসায় রোগীর মৃত্যু)Medical Negligence (ভুল চিকিৎসায় রোগীর মৃত্যু)
Medical Negligence (ভুল চিকিৎসায় রোগীর মৃত্যু)
 
Lecture 13 privacy, confidentiality and medical records
Lecture 13 privacy, confidentiality and medical recordsLecture 13 privacy, confidentiality and medical records
Lecture 13 privacy, confidentiality and medical records
 
Forensic medicine medical negligence 2-bolam principle
Forensic medicine   medical negligence 2-bolam principleForensic medicine   medical negligence 2-bolam principle
Forensic medicine medical negligence 2-bolam principle
 
Legal & Regulatory Powerpoint
Legal & Regulatory PowerpointLegal & Regulatory Powerpoint
Legal & Regulatory Powerpoint
 
Healthcare Information Privacy & Confidentiality: How To Work Very Well With ...
Healthcare Information Privacy & Confidentiality: How To Work Very Well With ...Healthcare Information Privacy & Confidentiality: How To Work Very Well With ...
Healthcare Information Privacy & Confidentiality: How To Work Very Well With ...
 
Medicolegal consideration
Medicolegal considerationMedicolegal consideration
Medicolegal consideration
 
Legal ethical issues & MLC
Legal ethical issues & MLCLegal ethical issues & MLC
Legal ethical issues & MLC
 
Medical Negligence
Medical Negligence Medical Negligence
Medical Negligence
 
SCHS Topic 3: Patients Rights
SCHS Topic 3: Patients RightsSCHS Topic 3: Patients Rights
SCHS Topic 3: Patients Rights
 
Patients Bill of Rights
Patients Bill of RightsPatients Bill of Rights
Patients Bill of Rights
 
MODULE 8 - PRIVACY AND CONFIDENTIALITY
MODULE 8 - PRIVACY AND CONFIDENTIALITYMODULE 8 - PRIVACY AND CONFIDENTIALITY
MODULE 8 - PRIVACY AND CONFIDENTIALITY
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Legal aspects of med prac
Legal aspects of med pracLegal aspects of med prac
Legal aspects of med prac
 
Legal issues in emergency medicine
Legal issues in emergency medicineLegal issues in emergency medicine
Legal issues in emergency medicine
 
Legal aspects of nursing philnursingstudent
Legal aspects of nursing philnursingstudentLegal aspects of nursing philnursingstudent
Legal aspects of nursing philnursingstudent
 
Medical Law and Ethics 4th Edition Fremgen Test Bank
Medical Law and Ethics 4th Edition Fremgen Test BankMedical Law and Ethics 4th Edition Fremgen Test Bank
Medical Law and Ethics 4th Edition Fremgen Test Bank
 

Destaque

Confidentality Training by Madison Co. Schools
Confidentality Training by Madison Co. SchoolsConfidentality Training by Madison Co. Schools
Confidentality Training by Madison Co. SchoolsAtlantic Training, LLC.
 
Confidentiality Training by Spotsylvania County Schools
Confidentiality Training by Spotsylvania County SchoolsConfidentiality Training by Spotsylvania County Schools
Confidentiality Training by Spotsylvania County SchoolsAtlantic Training, LLC.
 
Confidentiality and Special Education Training by Madison County Schools
Confidentiality and Special Education Training by Madison County SchoolsConfidentiality and Special Education Training by Madison County Schools
Confidentiality and Special Education Training by Madison County SchoolsAtlantic Training, LLC.
 
Confidentiality Training by Jacksboro ISD
Confidentiality Training by Jacksboro ISDConfidentiality Training by Jacksboro ISD
Confidentiality Training by Jacksboro ISDAtlantic Training, LLC.
 
Confidentiality in the Schools Training by WCSD
Confidentiality in the Schools Training by WCSDConfidentiality in the Schools Training by WCSD
Confidentiality in the Schools Training by WCSDAtlantic Training, LLC.
 
How to Effectively Deal with Conflict in the Workplace by F&P LLP
How to Effectively Deal with Conflict in the Workplace by F&P LLPHow to Effectively Deal with Conflict in the Workplace by F&P LLP
How to Effectively Deal with Conflict in the Workplace by F&P LLPAtlantic Training, LLC.
 
Responding to Conflict by Rutherford County
Responding to Conflict by Rutherford County Responding to Conflict by Rutherford County
Responding to Conflict by Rutherford County Atlantic Training, LLC.
 
Conflict Management, Resolution & Prevention by John Wiley & Sons
Conflict Management, Resolution & Prevention by John Wiley & SonsConflict Management, Resolution & Prevention by John Wiley & Sons
Conflict Management, Resolution & Prevention by John Wiley & SonsAtlantic Training, LLC.
 
Conflict Management by Professional Solutions
Conflict Management by Professional SolutionsConflict Management by Professional Solutions
Conflict Management by Professional SolutionsAtlantic Training, LLC.
 
Innovative Workplace Conflict Management by TCM
Innovative Workplace Conflict Management by TCMInnovative Workplace Conflict Management by TCM
Innovative Workplace Conflict Management by TCMAtlantic Training, LLC.
 
Crisis Management Training Strategies by RIMS
Crisis Management Training Strategies by RIMSCrisis Management Training Strategies by RIMS
Crisis Management Training Strategies by RIMSAtlantic Training, LLC.
 
Crisis Management Training by Iowa State University
Crisis Management Training by Iowa State UniversityCrisis Management Training by Iowa State University
Crisis Management Training by Iowa State UniversityAtlantic Training, LLC.
 
Material Handling & Back Safety Training by Gary Beaudette
Material Handling & Back Safety Training by Gary BeaudetteMaterial Handling & Back Safety Training by Gary Beaudette
Material Handling & Back Safety Training by Gary BeaudetteAtlantic Training, LLC.
 
Crisis Management in Organization Development by The College of Saint Scholas...
Crisis Management in Organization Development by The College of Saint Scholas...Crisis Management in Organization Development by The College of Saint Scholas...
Crisis Management in Organization Development by The College of Saint Scholas...Atlantic Training, LLC.
 
Hazard Communication Training by Oklahoma State University
Hazard Communication Training by Oklahoma State UniversityHazard Communication Training by Oklahoma State University
Hazard Communication Training by Oklahoma State UniversityAtlantic Training, LLC.
 
Crisis & Risk Management for Companies Training by University of Alexandria
Crisis & Risk Management for Companies Training by University of AlexandriaCrisis & Risk Management for Companies Training by University of Alexandria
Crisis & Risk Management for Companies Training by University of AlexandriaAtlantic Training, LLC.
 
Back Safety & Safe Lifting by Bureau of Workers’ Comp PATHS
Back Safety & Safe Lifting by Bureau of Workers’ Comp PATHSBack Safety & Safe Lifting by Bureau of Workers’ Comp PATHS
Back Safety & Safe Lifting by Bureau of Workers’ Comp PATHSAtlantic Training, LLC.
 

Destaque (20)

Confidentality Training by Madison Co. Schools
Confidentality Training by Madison Co. SchoolsConfidentality Training by Madison Co. Schools
Confidentality Training by Madison Co. Schools
 
Confidentiality Training by Spotsylvania County Schools
Confidentiality Training by Spotsylvania County SchoolsConfidentiality Training by Spotsylvania County Schools
Confidentiality Training by Spotsylvania County Schools
 
Confidentiality and Special Education Training by Madison County Schools
Confidentiality and Special Education Training by Madison County SchoolsConfidentiality and Special Education Training by Madison County Schools
Confidentiality and Special Education Training by Madison County Schools
 
Confidentiality Training by Jacksboro ISD
Confidentiality Training by Jacksboro ISDConfidentiality Training by Jacksboro ISD
Confidentiality Training by Jacksboro ISD
 
Confidentiality in the Schools Training by WCSD
Confidentiality in the Schools Training by WCSDConfidentiality in the Schools Training by WCSD
Confidentiality in the Schools Training by WCSD
 
Confidentiality Training by Electra ISD
Confidentiality Training by Electra ISDConfidentiality Training by Electra ISD
Confidentiality Training by Electra ISD
 
How to Effectively Deal with Conflict in the Workplace by F&P LLP
How to Effectively Deal with Conflict in the Workplace by F&P LLPHow to Effectively Deal with Conflict in the Workplace by F&P LLP
How to Effectively Deal with Conflict in the Workplace by F&P LLP
 
Responding to Conflict by Rutherford County
Responding to Conflict by Rutherford County Responding to Conflict by Rutherford County
Responding to Conflict by Rutherford County
 
Conflict Management, Resolution & Prevention by John Wiley & Sons
Conflict Management, Resolution & Prevention by John Wiley & SonsConflict Management, Resolution & Prevention by John Wiley & Sons
Conflict Management, Resolution & Prevention by John Wiley & Sons
 
Conflict Management by Professional Solutions
Conflict Management by Professional SolutionsConflict Management by Professional Solutions
Conflict Management by Professional Solutions
 
Dealing with Workplace Conflict by NSBN
Dealing with Workplace Conflict by NSBNDealing with Workplace Conflict by NSBN
Dealing with Workplace Conflict by NSBN
 
Innovative Workplace Conflict Management by TCM
Innovative Workplace Conflict Management by TCMInnovative Workplace Conflict Management by TCM
Innovative Workplace Conflict Management by TCM
 
Crisis Management Training Strategies by RIMS
Crisis Management Training Strategies by RIMSCrisis Management Training Strategies by RIMS
Crisis Management Training Strategies by RIMS
 
Crisis Management Training by Iowa State University
Crisis Management Training by Iowa State UniversityCrisis Management Training by Iowa State University
Crisis Management Training by Iowa State University
 
Material Handling & Back Safety Training by Gary Beaudette
Material Handling & Back Safety Training by Gary BeaudetteMaterial Handling & Back Safety Training by Gary Beaudette
Material Handling & Back Safety Training by Gary Beaudette
 
Crisis Management in Organization Development by The College of Saint Scholas...
Crisis Management in Organization Development by The College of Saint Scholas...Crisis Management in Organization Development by The College of Saint Scholas...
Crisis Management in Organization Development by The College of Saint Scholas...
 
Hazard Communication Training by Oklahoma State University
Hazard Communication Training by Oklahoma State UniversityHazard Communication Training by Oklahoma State University
Hazard Communication Training by Oklahoma State University
 
Crisis & Risk Management for Companies Training by University of Alexandria
Crisis & Risk Management for Companies Training by University of AlexandriaCrisis & Risk Management for Companies Training by University of Alexandria
Crisis & Risk Management for Companies Training by University of Alexandria
 
Back Safety & Safe Lifting by Bureau of Workers’ Comp PATHS
Back Safety & Safe Lifting by Bureau of Workers’ Comp PATHSBack Safety & Safe Lifting by Bureau of Workers’ Comp PATHS
Back Safety & Safe Lifting by Bureau of Workers’ Comp PATHS
 
Back & Lifting Safety by NPCA
Back & Lifting Safety by NPCABack & Lifting Safety by NPCA
Back & Lifting Safety by NPCA
 

Semelhante a HIPAA Training by UCSD

Introduction to HIPAA for Healthcare Professionals by OUP
Introduction to HIPAA for Healthcare Professionals by OUPIntroduction to HIPAA for Healthcare Professionals by OUP
Introduction to HIPAA for Healthcare Professionals by OUPAtlantic Training, LLC.
 
Mha 690 week one discussion ii
Mha 690 week one discussion iiMha 690 week one discussion ii
Mha 690 week one discussion iibeleza1669
 
Mha 690 week one discussion ii
Mha 690 week one discussion iiMha 690 week one discussion ii
Mha 690 week one discussion iibeleza1669
 
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)Sanjeev Bharwan
 
HIPAA Privacy Training by University of Hawaii
HIPAA Privacy Training by University of HawaiiHIPAA Privacy Training by University of Hawaii
HIPAA Privacy Training by University of HawaiiAtlantic Training, LLC.
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA BasicsKarna *
 
This training program is designed to introduce staff
This training program is designed to introduce staffThis training program is designed to introduce staff
This training program is designed to introduce staffsawanda
 
Introduction to HIPAA and Confidentiality for Employees
Introduction to HIPAA and Confidentiality for EmployeesIntroduction to HIPAA and Confidentiality for Employees
Introduction to HIPAA and Confidentiality for EmployeesHouse of New Hope
 
HIPAA Training - 2011
HIPAA Training - 2011HIPAA Training - 2011
HIPAA Training - 2011darichardson
 
Cw 13 hippa notice of privacy practices
Cw 13 hippa notice of privacy practicesCw 13 hippa notice of privacy practices
Cw 13 hippa notice of privacy practicesscreaminc
 
Highlights from ExL Pharma's 4th Clinical Billing & Research Compliance
Highlights from ExL Pharma's 4th Clinical Billing & Research ComplianceHighlights from ExL Pharma's 4th Clinical Billing & Research Compliance
Highlights from ExL Pharma's 4th Clinical Billing & Research ComplianceExL Pharma
 
Week 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy trainingWeek 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy trainingvrgill22
 
HIPAA Laws
HIPAA LawsHIPAA Laws
HIPAA Lawscitinfo
 
HIPAA and RHIOs
HIPAA and RHIOsHIPAA and RHIOs
HIPAA and RHIOsnobumoto
 
Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)bholmes
 

Semelhante a HIPAA Training by UCSD (20)

Hipaa inservice
Hipaa inserviceHipaa inservice
Hipaa inservice
 
HIPAA, PHI, & 42 CFR Part 2
HIPAA, PHI, & 42 CFR Part 2HIPAA, PHI, & 42 CFR Part 2
HIPAA, PHI, & 42 CFR Part 2
 
Introduction to HIPAA for Healthcare Professionals by OUP
Introduction to HIPAA for Healthcare Professionals by OUPIntroduction to HIPAA for Healthcare Professionals by OUP
Introduction to HIPAA for Healthcare Professionals by OUP
 
HIPAA & PHI Training
HIPAA & PHI TrainingHIPAA & PHI Training
HIPAA & PHI Training
 
Mha 690 week one discussion ii
Mha 690 week one discussion iiMha 690 week one discussion ii
Mha 690 week one discussion ii
 
Mha 690 week one discussion ii
Mha 690 week one discussion iiMha 690 week one discussion ii
Mha 690 week one discussion ii
 
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)
 
CONFIDENTIALITYANDHIPAA.ppt
CONFIDENTIALITYANDHIPAA.pptCONFIDENTIALITYANDHIPAA.ppt
CONFIDENTIALITYANDHIPAA.ppt
 
HIPAA Privacy Training by University of Hawaii
HIPAA Privacy Training by University of HawaiiHIPAA Privacy Training by University of Hawaii
HIPAA Privacy Training by University of Hawaii
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA Basics
 
This training program is designed to introduce staff
This training program is designed to introduce staffThis training program is designed to introduce staff
This training program is designed to introduce staff
 
HIPAA Audio Presentation
HIPAA  Audio PresentationHIPAA  Audio Presentation
HIPAA Audio Presentation
 
Introduction to HIPAA and Confidentiality for Employees
Introduction to HIPAA and Confidentiality for EmployeesIntroduction to HIPAA and Confidentiality for Employees
Introduction to HIPAA and Confidentiality for Employees
 
HIPAA Training - 2011
HIPAA Training - 2011HIPAA Training - 2011
HIPAA Training - 2011
 
Cw 13 hippa notice of privacy practices
Cw 13 hippa notice of privacy practicesCw 13 hippa notice of privacy practices
Cw 13 hippa notice of privacy practices
 
Highlights from ExL Pharma's 4th Clinical Billing & Research Compliance
Highlights from ExL Pharma's 4th Clinical Billing & Research ComplianceHighlights from ExL Pharma's 4th Clinical Billing & Research Compliance
Highlights from ExL Pharma's 4th Clinical Billing & Research Compliance
 
Week 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy trainingWeek 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy training
 
HIPAA Laws
HIPAA LawsHIPAA Laws
HIPAA Laws
 
HIPAA and RHIOs
HIPAA and RHIOsHIPAA and RHIOs
HIPAA and RHIOs
 
Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)
 

Mais de Atlantic Training, LLC.

Stress and Worker Safety by Pennsylvania L&I
Stress and Worker Safety by Pennsylvania L&IStress and Worker Safety by Pennsylvania L&I
Stress and Worker Safety by Pennsylvania L&IAtlantic Training, LLC.
 
Workplace Harassment Prevention by UT EAP
Workplace Harassment Prevention by  UT EAPWorkplace Harassment Prevention by  UT EAP
Workplace Harassment Prevention by UT EAPAtlantic Training, LLC.
 
Preventing Falls, Slips and Trips by MGSU
Preventing Falls, Slips and Trips by MGSUPreventing Falls, Slips and Trips by MGSU
Preventing Falls, Slips and Trips by MGSUAtlantic Training, LLC.
 
Preventing Workplace Harassment by Pennsylvania L&I
Preventing Workplace Harassment by Pennsylvania L&IPreventing Workplace Harassment by Pennsylvania L&I
Preventing Workplace Harassment by Pennsylvania L&IAtlantic Training, LLC.
 
Warehouses In Emergencies by WFP Logistics
Warehouses In Emergencies by WFP LogisticsWarehouses In Emergencies by WFP Logistics
Warehouses In Emergencies by WFP LogisticsAtlantic Training, LLC.
 
Sexual Harassment in the Workplace Training by Shumaker
Sexual Harassment in the Workplace Training by ShumakerSexual Harassment in the Workplace Training by Shumaker
Sexual Harassment in the Workplace Training by ShumakerAtlantic Training, LLC.
 
New Employee Safety Orientation by Oregon State University
New Employee Safety Orientation by Oregon State UniversityNew Employee Safety Orientation by Oregon State University
New Employee Safety Orientation by Oregon State UniversityAtlantic Training, LLC.
 

Mais de Atlantic Training, LLC. (20)

Wellness for Supervisors by SWOSU
Wellness for Supervisors by SWOSUWellness for Supervisors by SWOSU
Wellness for Supervisors by SWOSU
 
Workplace Wellness by PHA
Workplace Wellness by PHAWorkplace Wellness by PHA
Workplace Wellness by PHA
 
Stress Management Training by SG
Stress Management Training by  SGStress Management Training by  SG
Stress Management Training by SG
 
Stress Management Training by SW
Stress Management Training by SWStress Management Training by SW
Stress Management Training by SW
 
Stress and Worker Safety by Pennsylvania L&I
Stress and Worker Safety by Pennsylvania L&IStress and Worker Safety by Pennsylvania L&I
Stress and Worker Safety by Pennsylvania L&I
 
Respectful Workplace by RDTC
Respectful Workplace by RDTCRespectful Workplace by RDTC
Respectful Workplace by RDTC
 
Workplace Harassment by CLGW
Workplace Harassment by CLGWWorkplace Harassment by CLGW
Workplace Harassment by CLGW
 
Workplace Harassment Prevention by UT EAP
Workplace Harassment Prevention by  UT EAPWorkplace Harassment Prevention by  UT EAP
Workplace Harassment Prevention by UT EAP
 
Welding Safety by Pennsylvania L&I
Welding Safety by Pennsylvania L&IWelding Safety by Pennsylvania L&I
Welding Safety by Pennsylvania L&I
 
Slips Trips & Falls Training by Signal
Slips Trips & Falls Training by SignalSlips Trips & Falls Training by Signal
Slips Trips & Falls Training by Signal
 
Preventing Falls, Slips and Trips by MGSU
Preventing Falls, Slips and Trips by MGSUPreventing Falls, Slips and Trips by MGSU
Preventing Falls, Slips and Trips by MGSU
 
Preventing Workplace Harassment by Pennsylvania L&I
Preventing Workplace Harassment by Pennsylvania L&IPreventing Workplace Harassment by Pennsylvania L&I
Preventing Workplace Harassment by Pennsylvania L&I
 
Warehouses In Emergencies by WFP Logistics
Warehouses In Emergencies by WFP LogisticsWarehouses In Emergencies by WFP Logistics
Warehouses In Emergencies by WFP Logistics
 
Prevention of Sexual Harassment by USMC
Prevention of Sexual Harassment by USMCPrevention of Sexual Harassment by USMC
Prevention of Sexual Harassment by USMC
 
Sexual Harassment by DEOMI
Sexual Harassment by DEOMISexual Harassment by DEOMI
Sexual Harassment by DEOMI
 
Sexual Harassment in the Workplace Training by Shumaker
Sexual Harassment in the Workplace Training by ShumakerSexual Harassment in the Workplace Training by Shumaker
Sexual Harassment in the Workplace Training by Shumaker
 
Sexual Harassment Training by NAP
Sexual Harassment Training by NAPSexual Harassment Training by NAP
Sexual Harassment Training by NAP
 
Scaffolds Training by Pennsylvania L&I
Scaffolds Training by Pennsylvania L&IScaffolds Training by Pennsylvania L&I
Scaffolds Training by Pennsylvania L&I
 
Supervision
SupervisionSupervision
Supervision
 
New Employee Safety Orientation by Oregon State University
New Employee Safety Orientation by Oregon State UniversityNew Employee Safety Orientation by Oregon State University
New Employee Safety Orientation by Oregon State University
 

Último

Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...lizamodels9
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...amitlee9823
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...rajveerescorts2022
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangaloreamitlee9823
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756dollysharma2066
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 

Último (20)

Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pillsMifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 

HIPAA Training by UCSD

  • 1. 1 HASPI approved HIPAA TRAINING MODULE UCSD Health Sciences February 25, 2010 This training module satisfies Federal laws which mandate workforce privacy / security training at the time of hire and UC policy for annual privacy training for Health Insurance Portability and Accountability Act (HIPAA) and the California Confidentiality of Medical Information Act (CMIA)
  • 2. 2 Who must complete privacy / security training?  Anyone who works with or may see health, financial, or confidential information with personal identifiers  Anyone who uses a computer or electronic device to store and/or transmit personal or health information  Such as:  Medical Center / Medical Group employees  Schools of Medicine / Pharmacy employees, health professions trainees  Campus administrative & technical staff who work in clinical areas  Volunteers (Including Volunteer Clinical Faculty)  Students who work in patient care areas  Research staff and investigators  Accounting, Payroll and Benefits staff  Other independent contractors with access to personal / health information who assist healthcare employees with their job
  • 3. 3 Objectives  Understand what information must be protected under state and federal privacy laws  Understand your role in maintaining privacy and security of protected health information (PHI)  Understand what rights patients have regarding access and use of medical information  Understand your role with adhering to data security standards and responsibility for reporting incidents  Understand the consequences and risks of individual penalties for non- compliance
  • 4. 4  HIPAA: Health Insurance Portability and Accountability Act of 1996. The purpose of the law was to make health insurance more efficient and portable.  Because of public concerns about confidentiality, it also addressed information protection. Privacy Standards: April 2003 Protect an individual’s health information and provide patients with certain rights Security Standards: Final Rule Published February 20, 2003 Physical, technical and administrative safeguards of patient information that is stored electronically. (Effective: 2005) Codes and Transaction Standards: October 2003 Standardization for electronic billing and claims management. HIPAA
  • 5. 5 Confidentiality of Medical Information Act (CMIA)  CMIA prohibits disclosure of “medical information” without prior authorization unless permitted by law.  (California Civil Code 56.10)  Medical information means any individually identifiable information in the possession of or derived from a provider of health care regarding a patient’s medical history, mental or physical condition, or treatment.  (California Civil Code 56.05(g))
  • 6. 6 What information must you protect? PHI  Protected health information (PHI) is any personal or health information created or maintained in the course of providing treatment, obtaining payment for services, or while engaged in health care operations including teaching and research activities.  Common examples of PHI include:  Medical records, test results and treatment plans  Billing records, referral authorizations and health insurance information  Name, address, social security number and photographs
  • 7. 7 To the Patient, It’s All Confidential Information  Patient Personal Information  Patient Financial Information  Patient Medical Information  Written, Spoken, Electronic PHI  Patient Information may be accessed, used, or disclosed only to do your job
  • 8. 8 Requirements before PHI is Used or Disclosed  In order to use or disclose PHI:  The healthcare institution must give each patient a “Notice of Privacy Practices” that:  Describes how the institution may use and disclose the patient’s protected health information (PHI) and  Advises the patient of his/her privacy rights  The healthcare institution must attempt to obtain a patient’s signature acknowledging receipt of the Notice, except in emergency situations. If a signature is not obtained, the healthcare institution must document the reason.  The healthcare institution must provide privacy / security training to its workforce.
  • 9. 9 Employee Access to Protected Health Information (PHI)  Patient information is confidential and shall not be accessed or viewed other than for the sole purpose of performing employment duties and responsibilities  Accessing a record, including your own or that of a family member or friend without a work purpose is a violation of policy  Inappropriate access to patient information may result in disciplinary action up to and including termination as well as individual fines.
  • 10. 10 You may…  Look at a patient’s PHI only if you need to do so for your job  Use a patient’s PHI only if you need to do so for your job  Disclose a patient’s PHI to others only when it is necessary for others to do their job  Limit your access, use and disclosure of PHI to the minimum necessary information needed to perform your job.
  • 11. 11 PHI may be Used and Disclosed for the Following Purposes:  Treatment:  We may use and disclose medical information about a patient to health system doctors, nurses, technicians, students or providers who are involved in the patient’s care  Payment:  We may use and disclose medical information about the patient so that the treatment and services received may be billed and payment may be collected.  Operations:  We may use and disclose medical information for teaching, medical staff peer review, legal purposes, internal auditing, to conduct customer service surveys, and general business management
  • 12. 12 Other Permitted Uses and Disclosures  For appointment reminders  Take care to avoid leaving messages on answering machines which disclose sensitive information.  To provide treatment alternatives  To provide limited information about patients for the hospital directory  To assist other individuals involved in the patient’s care (e.g., friends, family, etc.), if determined to be in the patient’s best interest.  For disaster relief efforts  For research (with HRPP / IRB approval)  For fundraising, using limited demographic
  • 13. 13 Other Permitted Uses and Disclosures  To avert serious threat to health and safety  For organ and tissue procurement, reimplantation, or banking purposes  To military command authorities about armed forces patients  To workers’ compensation programs (minimum necessary)  For public health disclosures  For government oversight activities  To law enforcement, for certain activities  To coroners, medical examiners and funeral directors  For national security and intelligence activities  To correctional institutions about inmates  For certain legal proceedings, lawsuits and other legal activities  To business associates with a written business associate agreement
  • 14. 14 Examples of Permitted Uses and Disclosures  To avert a serious threat to health or safety: PHI may be used to prevent or lessen a serious and imminent threat to a person or the public.  Public-health disclosures: PHI may be used to report data to prevent or control disease, injury or disability as required by law (e.g., reporting of disease, injury, vital events such as birth or death).
  • 15. 15 Continued Examples of Permitted Uses and Disclosures  Government health oversight activities: PHI may be used for government or certification audits: civil, administrative, or criminal investigations or proceedings; or licensure or disciplinary action  Law enforcement: PHI may be used to report suspected abuse, neglect or domestic violence; death resulting from criminal conduct; criminal conduct occurring on premises; or limited PHI for identifying or apprehending a suspect, witness or missing person  Individuals involved in the patient’s care or payment of care: PHI may be disclosed to a family member, relative (or anyone identified by the patient as involved in the patient’s medical care or assisting in paying for a patient’s medical care), IF…  The patient agrees or had an opportunity to object to the disclosure, and did not; or  Based on the exercise of professional judgment, it appears that the patient would not object to the disclosure; or  In cases where the patient is not present or incapacitated, the disclosure is in the best interests of the patient, based on the exercise of professional judgment.
  • 16. 16 Continued Examples of Permitted Uses and Disclosures:  A provider may use PHI to communicate to a patient about a product or service that UCSD Medical Center provides.  A provider may use PHI to communicate to a patient about general health issues, e.g., disease prevention, wellness classes, etc. For all other marketing communications, a patient’s written authorization is required
  • 17. 17 Continued Examples of Permitted Uses and Disclosures:  Staff may only use demographic information (name, address, age, type of medical insurance) and dates of service for fundraising without authorization. (Disease, diagnosis or condition may not be used to develop a fundraising list.)  Staff must obtain a patient’s written authorization to use any other PHI for fundraising  All fundraising materials must provide the recipient with a way to opt out of receiving any additional fundraising material
  • 18. 18 Continued Examples of Permitted Uses and Disclosures: Research  De-identified PHI. Aggregate data (stripped of all 18 identifiers) may be used and disclosed for research purposes without prior authorization, e.g., work preparatory to research / feasibility assessment  Limited Data Set of PHI. With the removal of PHI direct identifiers (name, address, SSN, account number and other identifiers), a limited data set may be used and disclosed if a Data Use Agreement or another appropriate agreement is in place.  Limited data set may include “indirect identifiers” (dates, age, zip codes)  PHI. In order to access or use PHI restricted databases for research purposes, the researcher must obtain appropriate IRB approval of the research protocol and the subject’s consent or an IRB waiver of authorization.
  • 19. 19 Continued Examples of Permitted Uses and Disclosures:  Staff may disclose PHI to a 3rd party Business Associate to assist the healthcare institution to do its job as long as a Business Associate Agreement (BAA) is in place  Examples of “business associates”:  Medical transcription and billing vendors  Vendors assisting with medical account receivables  Attorneys, consultants, data aggregation services  Other vendors if they require access to PHI to assist healthcare institution with health care functions  Refer requests for BAA agreements to the appropriate UC office for review and authorized signature, e.g., Purchasing, Contracting.
  • 20. 20 All Other Uses of PHI Require Written Authorization  HIPAA has very specific requirements for the written authorization. It must:  Describe the PHI to be released  Identify who may release the PHI  Identify who may receive the PHI  Describe the purposes of the disclosure  Identify when the authorization expires  Be signed by the patient / patient representative
  • 21. 21 Examples of Circumstances when Patient Authorization is Required  Medical Records:  For the use and disclosure of medical information or records when that information is being provided / sent to someone other than the patient (e.g., patient’s employer, friend, family, lawyer, accountant, etc.)  Media Communications:  For the use and disclosure to the media or for other types of external communications that contain PHI  Marketing and Other Products:  For the use and disclosure of a patient’s PHI to pharmaceutical or medical device companies, non-profit organizations, etc.  Fundraising  For the use and disclosure of a patient’s PHI, other than demographic information
  • 23. 23 HIPAA Gives the Patient Specific Privacy Rights  Patients have a right to request restriction of PHI uses and disclosures. Restrictions should not be granted by faculty or staff without consulting the Privacy Officer.  Patients have a right to request confidential forms of communications (mail to the P.O. Box not street address, no messages on answering machines, etc.).  Patients have a right to access and receive a copy of their medical record.  Patients have a right to an accounting of the disclosures of their PHI.  Patients have a right to request amendments to their medical record.
  • 24. 24 Federal/State Privacy & Security Laws Require…  Providers of health care to implement administrative, physical and technical safeguards to:  Ensure the confidentiality and privacy of medical information  Protect against reasonably anticipated threats or unauthorized uses or disclosures of PHI (45 CFR 164.306)  Safeguard patient medical information from unauthorized or unlawful access, use or disclosure  Implement policies and procedures to prevent, detect, contain, and correct security violations (45 CFR 164.308)
  • 25. 25 Privacy / Security: Safeguards & Reminders  Keep office(s) secured  Password protect your computer  Backup your electronic information  Run updated anti-virus, anti-spam, and anti-spyware software  Keep removable media (e.g., CDs, DVDs, USB attached drives) locked up  In patient care settings, prevent ID theft by verifying the patient’s identification at the time of service, e.g., driver license, passport, government issued photo ID  Report privacy complaints and security incidents and… respond to incident reports promptly!
  • 26. 26 Good Computing Practices: E-mail  Don’t open, forward, or reply to suspicious e-mails  Don’t open suspicious e-mail attachments or click on unknown website addresses  Don’t download unknown or unsolicited programs  Delete spam
  • 27. 27 Good Computing Practices: Passwords  Use long, cryptic passwords that can’t be easily guessed  Protect your passwords -- don’t write them down  Never share your passwords
  • 28. 28 Good Computing Practices: Workstation Security  Physically secure your area and data when unattended  Encrypt files & portable devices containing restricted data (e.g., laptops, memory / USBs) to 128+  Secure laptop computers with a lockdown cable  Never share your access code, card or key  Lock your screen or log-off from restricted systems
  • 29. 29 Good Computing Practices: Portable Device Security  Don’t keep confidential data on portable devices, unless it is absolutely necessary  Back-up data on portable devices to your department’s secure server  Encrypt (128+) and/or password protect all devices  Encryption is a process that renders electronic information unusable, unreadable or indecipherable without the key.
  • 30. 30 Good Computing Practices: Data Management  Know where PHI / restricted data is stored  Destroy confidential data which is no longer needed  Shred or otherwise destroy restricted data  Erase information before disposing of or reusing drives  Protect confidential and restricted data that you keep with back-ups to a departmental server
  • 31. 31 Notice of Breach Federal / State Privacy Laws:  Require licensed health facilities (clinic, hospital, home health agency, or hospice) to prevent and report unlawful or unauthorized access to, and use or disclosure of, patients' medical information. (Health & Safety Code 1280.15)  Violations must be reported to:  California Department of Public Health (CDPH) -- no later than five days after the unlawful or unauthorized access, use, or disclosure has been detected; and to the federal government.  Patients – notification of violation or breach, e.g., snooping, certain breaches of computerized data that contain unencrypted personal information about the patient.
  • 32. 32 Penalties  State / Federal Privacy Laws:  Agencies may assess fines and civil penalties against any individual or provider of health care  Penalties range from $2,500 - $250,000 per occurrence (or higher), depending on the circumstances. Repeat violations and violations for financial gain are assessed higher penalties.  Violations may also be reported to the licensing board  California law permits civil suits against the individual
  • 33. 33 Reporting Privacy and Security Breaches  Examples of reportable incidents and violations:  Any employee accessing patient information for non-work purposes  Loss / theft of computers, portable devices that contain unencrypted health information or personally identified information  Any loss / theft of medical records, films, etc.  Any complaints related to suspected identity theft or medical identify theft
  • 34. 34 Questions about Privacy / Security?  Sonia Lira, HASPI Industry Coordinator  Sonia.lira@gcccd.edu  Janet Hoff, HASPI Program Manager  Janet.hoff@gcccd.edu  Heather Peterson, HASPI Curriculum Coordinator  Hpeterson@guhsd.net
  • 35. 35 Confidentiality Statement  The protection of health and other confidential information is a right protected by law and enforced by individual and institutional fines, criminal penalties as well as healthcare policy. Safeguarding confidential information is a fundamental obligation for all employees, clinical faculty, house staff, students and volunteers.  I understand and acknowledge that: 1. I shall protect the privacy and security of confidential information at all times, both during and after my participation in a RAHSI health pathway program. 2. I agree to (a) access, use, or view confidential information to the minimum extent necessary for my assigned duties; and (b) disclose such information only to persons authorized to receive it. 3. Inappropriate access and unauthorized release of protected information will result in disciplinary action, up to and including termination of employment, and will result in a report to authorities charged with professional licensing, enforcement of privacy laws and prosecution of criminal acts. The Office of Health Information Integrity (OHII) may levy penalties to individuals or providers of healthcare of $2,500 - $25,000 per violation. 4. User IDs cannot be shared. Inappropriate use of my ID (whether by me or anyone else) is my responsibility and exposes me to severe consequences. Print Name: ______________________________________________/ Date: ____________
  • 36. 36 Certification of HIPAA Training I have read the Privacy / Security training materials and confidentiality statement and understand the Federal / State privacy laws.  Print name: ____________________________________  Sign name: ____________________________________  School name:___________________________________  Student number: _______________________<if known>  Health Pathway Courses Completed: _____________________________________________ _____________________________________________