SlideShare uma empresa Scribd logo
1 de 23
Baixar para ler offline
Notification of Breach
                          Release of Information Discussion
                         Presented By: Janine Akers from DataFile Technologies



Technical Doctor, Inc.
Connecting Technology & Professionals
About DataFile Technologies
                                        •Privately Held Kansas City Company

                                        •Work with Major EMRs

                                        •National Partnership with Multiple Companies




Technical Doctor, Inc.
Connecting Technology & Professionals
Overview

                      • HITECH Act Changes to HIPAA
                                           g
                        Notification of Breach


                      • Release of Information Best Practice
                        Resources

                       • How our eROI Services can work for
                         You.




Technical Doctor, Inc.
Connecting Technology & Professionals
Notification of Breach



       Do we need
        to notify a
         patient?




Technical Doctor, Inc.
Connecting Technology & Professionals
HITECH Historical View
                     Brief History of HITECH Act
                     Subtitle D—13400’s Section


                      August 2009
                    1st Set of Proposed Rules for HIPAA Privacy
                                                        Privacy,
                    Security and Enforcement Rules

                      February 2010
                      F b
                    Above proposed rules are finalized

                      July 2010
                    Above final was recalled and 2nd set of
                    proposed rules were published
                            d l            bli h d
Technical Doctor, Inc.
Connecting Technology & Professionals
HITECH Proposed Changes

                    Changes Proposed in Current Comment Period


                          Notice of Privacy Practices


                          Changes to definition of medical necessity


                          Immunization records & deceased records


                          Definitions of electronic media

                          Breaches – Guidance for Significant Risk
Technical Doctor, Inc.
Connecting Technology & Professionals
What is a Breach?
                 How does HITECH Act define a breach?


                       Was the protected health information secure?

                       Do one of the exclusions apply?


                       Is there a significant risk of financial,
                       reputational, or other harm to the individual?




Technical Doctor, Inc.
Connecting Technology & Professionals
The Exclusions

                 What are the exclusions provided by HITECH?
                  Workforce use
                         •     Unintentional acquisition, access or use of PHI by a
                               workforce member if the PHI is not further used or
                               disclosed in a manner that violates the Privacy Rule
                       Workforce disclosure
                         •     Unintentional disclosure of PHI by a workforce member to
                               another workforce member if the PHI is not further used or
                               disclosed in a manner that violates the Privacy Rule
                       No way to retain the information
                         •     Unauthorized di l
                               U     th i d disclosure t which th CE or BA h a good
                                                          to hi h the          has       d
                               faith belief that the unauthorized person to whom the PHI is
                               disclosed would not reasonably have been able to retain
                               info.

Technical Doctor, Inc.
Connecting Technology & Professionals
Guidance for Significant Risk

                  What guidance is provided by HITECH?


                        Covered Entity to Covered Entity
                          •     Inadvertent disclosure of PHI from one covered entity or BA
                                                                                     y
                                employee to another similarly situated covered entity or BA
                                employee, provided that PHI is not further used or
                                disclosed in any manner that violates the Privacy Rule.
                        Immediate steps to mitigate
                          •     Were immediate steps taken to mitigate the harm including
                                return or destruction of the information and a written
                                confidentiality agreement ?
                        Types of information included
                          •     Was the information disclosed limited to the name of the
                                individual
                                indi id al or a limited data set?
Technical Doctor, Inc.
Connecting Technology & Professionals
Notification Components

                  What are the required notification components?


                        A description of what happened including the
                        date of breach and date of discovery y
                        A description of the types of PHI involved
                        Steps the individual should take to protect
                        themselves
                        Steps taken by the provider to investigate,
                        mitigate and protect against further disclosure
                        Contact information for questions including a
                        toll-free telephone number, email address,
                        website or postal address
                            b it        t l dd
Technical Doctor, Inc.
Connecting Technology & Professionals
Example Letter of Notification




Technical Doctor, Inc.
Connecting Technology & Professionals
Penalties & Reporting

                    What are the penalties & reporting obligations?
                     Defined d
                     D fi d and enacted b k i F b
                                        t d back in February 2009 i in
                     original ARRA/HITECH Act - HIPAA Section to
                     apply to both the Breach and the Notification

Nature of Violation Fine Per Violation                        Annual
                                                              Maximum
Unknowing                                 $100                $25,000
Reasonable Cause                          $1,000              $100,000
Willful Neglect                           $10,000
                                          $10 000             $250,000
                                                              $250 000
Willful Neglect Not                       $50,000             $1,500,000
Corrected


  Technical Doctor, Inc.
  Connecting Technology & Professionals
Reporting Reference

                   Records 
                               Authorized                                                                                                                  Proactive approach for preventive 
Date   Patient   Originated                   Incident           How mistake happened            Mistake discovered   Mistake rectified and Notification
                                Recipient                                                                                                                              measures
                 from Clinic




                                                          After it has been brought to our 
                                                                                                                         Starting with date and 
                                                          attention that there has been an                                                                Starting with date and 
                                                                                                                            name of employee 
                                                            oversight, mistake, or HIPAA                                                              supervisor’s name, document 
                                                                                                                          initiating report and 
                                                         violation (regardless of how big or  Starting with date and                                 how we will use this occurrence 
     Patient                             Description of                                                                  correcting the problem, 
              Medical                                    small)‐ we will document, research  resource, describe in                                  to train the entire staff regarding 
Date Name &                    Requestor the unique                                                                     describe in detail actions 
              Practice                                     and come to understand what  detail how this mistake                                      our best practice procedures to 
                                                                                                                                                               p        p
      DOB                                 occurrence.                                                                      taken to correct the 
                                                                                                                           t k t            t th
                                                        happened and describe in detail how  was discovered.                                            prevent the possibility of a 
                                                                                                                        problem and how patient 
                                                          this occurred.  Include date and                                                            similar occurrence happening 
                                                                                                                        and covered entity were 
                                                          employee names involved in the                                                                          again.  
                                                                                                                                 notified.  
                                                                communication trail.




                 Technical Doctor, Inc.
                 Connecting Technology & Professionals
Limit Your Liability



                                           • Staff training

                                           • Process
                                             improvement

                                           • Transfer the
                                             liability
                                                     y




Technical Doctor, Inc.
Connecting Technology & Professionals
Why DataFile?




                                   Improve customer service
                                   Improve customer service
                                   Mitigate risk
                                   Offer rapid response
                                           p      p
                                   Eliminate training expenses
                                   Take fewer calls

Technical Doctor, Inc.
Connecting Technology & Professionals
DataFile Technologies eROI



How do our services work?




 Technical Doctor, Inc.
 Connecting Technology & Professionals
How It Works: Step 1
1. Establish HIPAA secure network connection




  Technical Doctor, Inc.
  Connecting Technology & Professionals
How It Works: Step 2
2. Set up a User in the EMR for “DataFile”




   Technical Doctor, Inc.
   Connecting Technology & Professionals
How It Works: Step 3
3. Scan/attach appropriate Patient and Task or Message to user 
   “DataFile”




   Technical Doctor, Inc.
   Connecting Technology & Professionals
Start a Request to DataFile




Technical Doctor, Inc.
Connecting Technology & Professionals
Status Update on Request




Technical Doctor, Inc.
Connecting Technology & Professionals
The Brass Tacks

                                        What is the cost for eROI services?
                                        • T i ll
                                          Typically… NONE

                                        • The variables involved in eROI
                                          include
                                           – Specialty
                                           – Number of Providers
                                           – State
                                        • Providers can maximize service while
                                          eliminating costs with eROI services


Technical Doctor, Inc.
Connecting Technology & Professionals
Questions & Thank You


                              Janine B. Akers, MBA
                              DataFile Technologies, LLC




                    janine.akers@datafiletechnologies.com
                                816‐437‐9134




Technical Doctor, Inc.
Connecting Technology & Professionals

Mais conteúdo relacionado

Destaque

Joomla User Experience: Look Back & Forward
Joomla User Experience: Look Back & ForwardJoomla User Experience: Look Back & Forward
Joomla User Experience: Look Back & ForwardRon Severdia
 
Final presentation
Final presentationFinal presentation
Final presentationLGuntherberg
 
Dragon Training by Technical Dr
Dragon Training by Technical DrDragon Training by Technical Dr
Dragon Training by Technical DrTechnical Doctors
 
Global warming
Global warmingGlobal warming
Global warmingdan241996
 
Vehicle technology impacts on rescue (v.1.2)
Vehicle technology impacts on rescue (v.1.2)Vehicle technology impacts on rescue (v.1.2)
Vehicle technology impacts on rescue (v.1.2)Harry Burch
 
Preparing for ePub 3
Preparing for ePub 3Preparing for ePub 3
Preparing for ePub 3Ron Severdia
 
Patient Portal Training by Technical Doctor
Patient Portal Training by Technical DoctorPatient Portal Training by Technical Doctor
Patient Portal Training by Technical DoctorTechnical Doctors
 
Shakespeare Passport: Shakespeare Theatre Association Conference 2015
Shakespeare Passport: Shakespeare Theatre Association Conference 2015Shakespeare Passport: Shakespeare Theatre Association Conference 2015
Shakespeare Passport: Shakespeare Theatre Association Conference 2015Ron Severdia
 

Destaque (8)

Joomla User Experience: Look Back & Forward
Joomla User Experience: Look Back & ForwardJoomla User Experience: Look Back & Forward
Joomla User Experience: Look Back & Forward
 
Final presentation
Final presentationFinal presentation
Final presentation
 
Dragon Training by Technical Dr
Dragon Training by Technical DrDragon Training by Technical Dr
Dragon Training by Technical Dr
 
Global warming
Global warmingGlobal warming
Global warming
 
Vehicle technology impacts on rescue (v.1.2)
Vehicle technology impacts on rescue (v.1.2)Vehicle technology impacts on rescue (v.1.2)
Vehicle technology impacts on rescue (v.1.2)
 
Preparing for ePub 3
Preparing for ePub 3Preparing for ePub 3
Preparing for ePub 3
 
Patient Portal Training by Technical Doctor
Patient Portal Training by Technical DoctorPatient Portal Training by Technical Doctor
Patient Portal Training by Technical Doctor
 
Shakespeare Passport: Shakespeare Theatre Association Conference 2015
Shakespeare Passport: Shakespeare Theatre Association Conference 2015Shakespeare Passport: Shakespeare Theatre Association Conference 2015
Shakespeare Passport: Shakespeare Theatre Association Conference 2015
 

Semelhante a Data file.technical drs.hipaa presentation may 2011

Assuring regulatory compliance, ePHI protection, and secure healthcare delivery
Assuring regulatory compliance, ePHI protection, and secure healthcare deliveryAssuring regulatory compliance, ePHI protection, and secure healthcare delivery
Assuring regulatory compliance, ePHI protection, and secure healthcare deliveryTrend Micro
 
Keynote Presentation "Building a Culture of Privacy and Security into Your Or...
Keynote Presentation "Building a Culture of Privacy and Security into Your Or...Keynote Presentation "Building a Culture of Privacy and Security into Your Or...
Keynote Presentation "Building a Culture of Privacy and Security into Your Or...Health IT Conference – iHT2
 
20190523 Breach Notification Wizard: Lessons in Knowledge Management!
20190523 Breach Notification Wizard: Lessons in Knowledge Management!20190523 Breach Notification Wizard: Lessons in Knowledge Management!
20190523 Breach Notification Wizard: Lessons in Knowledge Management!3Lions Publishing, Inc.
 
What Is Security Risk Analysis? By: MedSafe
What Is Security Risk Analysis? By: MedSafeWhat Is Security Risk Analysis? By: MedSafe
What Is Security Risk Analysis? By: MedSafeMedSafe
 
Business Associate Assurance: What Covered Entities Need to Know
Business Associate Assurance: What Covered Entities Need to KnowBusiness Associate Assurance: What Covered Entities Need to Know
Business Associate Assurance: What Covered Entities Need to Knowdata brackets
 
Interconnected Health 2012 Hitech 3 Years Later
Interconnected Health 2012 Hitech 3 Years LaterInterconnected Health 2012 Hitech 3 Years Later
Interconnected Health 2012 Hitech 3 Years Laterprivacypros
 
Your healthy practice July/August 2011
Your healthy practice July/August 2011Your healthy practice July/August 2011
Your healthy practice July/August 2011Kushner LaGraize, LLC
 
HIPAA Part I the Law Test
HIPAA Part I  the Law TestHIPAA Part I  the Law Test
HIPAA Part I the Law TestSachiko Hurst
 
Hitech changes-to-hipaa
Hitech changes-to-hipaaHitech changes-to-hipaa
Hitech changes-to-hipaageeksikh
 
HIPAA Compliance For Small Practices
HIPAA Compliance For Small PracticesHIPAA Compliance For Small Practices
HIPAA Compliance For Small PracticesNisos Health
 
Protecting ePHI: What Providers and Business Associates Need to Know
Protecting ePHI: What Providers and Business Associates Need to KnowProtecting ePHI: What Providers and Business Associates Need to Know
Protecting ePHI: What Providers and Business Associates Need to KnowNetwork 1 Consulting
 
how to really implement hipaa presentation
how to really implement hipaa presentationhow to really implement hipaa presentation
how to really implement hipaa presentationProvider Resources Group
 
Patient Privacy Provisions of the HITECH Act Implications for Patients and Sm...
Patient Privacy Provisions of the HITECH Act Implications for Patients and Sm...Patient Privacy Provisions of the HITECH Act Implications for Patients and Sm...
Patient Privacy Provisions of the HITECH Act Implications for Patients and Sm...Xiaoming Zeng
 
Telehealth Clinical Best Practices Workshop I 5 23-2020
Telehealth Clinical Best Practices Workshop I 5 23-2020Telehealth Clinical Best Practices Workshop I 5 23-2020
Telehealth Clinical Best Practices Workshop I 5 23-2020Marlene Maheu
 
Business Associate Assessment, Agreement and Requirements
Business Associate Assessment, Agreement and RequirementsBusiness Associate Assessment, Agreement and Requirements
Business Associate Assessment, Agreement and Requirementsdata brackets
 
Protecting PHI with encryption for HIPAA compliance
Protecting PHI with encryption for HIPAA complianceProtecting PHI with encryption for HIPAA compliance
Protecting PHI with encryption for HIPAA complianceTodd Merrill
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippamaggie_Platt
 

Semelhante a Data file.technical drs.hipaa presentation may 2011 (20)

Healthcare Cyber Security Webinar
Healthcare Cyber Security WebinarHealthcare Cyber Security Webinar
Healthcare Cyber Security Webinar
 
Assuring regulatory compliance, ePHI protection, and secure healthcare delivery
Assuring regulatory compliance, ePHI protection, and secure healthcare deliveryAssuring regulatory compliance, ePHI protection, and secure healthcare delivery
Assuring regulatory compliance, ePHI protection, and secure healthcare delivery
 
Audit Reality Webinar
Audit Reality WebinarAudit Reality Webinar
Audit Reality Webinar
 
Keynote Presentation "Building a Culture of Privacy and Security into Your Or...
Keynote Presentation "Building a Culture of Privacy and Security into Your Or...Keynote Presentation "Building a Culture of Privacy and Security into Your Or...
Keynote Presentation "Building a Culture of Privacy and Security into Your Or...
 
20190523 Breach Notification Wizard: Lessons in Knowledge Management!
20190523 Breach Notification Wizard: Lessons in Knowledge Management!20190523 Breach Notification Wizard: Lessons in Knowledge Management!
20190523 Breach Notification Wizard: Lessons in Knowledge Management!
 
What Is Security Risk Analysis? By: MedSafe
What Is Security Risk Analysis? By: MedSafeWhat Is Security Risk Analysis? By: MedSafe
What Is Security Risk Analysis? By: MedSafe
 
Business Associate Assurance: What Covered Entities Need to Know
Business Associate Assurance: What Covered Entities Need to KnowBusiness Associate Assurance: What Covered Entities Need to Know
Business Associate Assurance: What Covered Entities Need to Know
 
Interconnected Health 2012 Hitech 3 Years Later
Interconnected Health 2012 Hitech 3 Years LaterInterconnected Health 2012 Hitech 3 Years Later
Interconnected Health 2012 Hitech 3 Years Later
 
Your healthy practice July/August 2011
Your healthy practice July/August 2011Your healthy practice July/August 2011
Your healthy practice July/August 2011
 
HIPAA Part I the Law Test
HIPAA Part I  the Law TestHIPAA Part I  the Law Test
HIPAA Part I the Law Test
 
Hitech changes-to-hipaa
Hitech changes-to-hipaaHitech changes-to-hipaa
Hitech changes-to-hipaa
 
HIPAA Compliance For Small Practices
HIPAA Compliance For Small PracticesHIPAA Compliance For Small Practices
HIPAA Compliance For Small Practices
 
Protecting ePHI: What Providers and Business Associates Need to Know
Protecting ePHI: What Providers and Business Associates Need to KnowProtecting ePHI: What Providers and Business Associates Need to Know
Protecting ePHI: What Providers and Business Associates Need to Know
 
2010 Hipaa Rules 011310
2010 Hipaa Rules 0113102010 Hipaa Rules 011310
2010 Hipaa Rules 011310
 
how to really implement hipaa presentation
how to really implement hipaa presentationhow to really implement hipaa presentation
how to really implement hipaa presentation
 
Patient Privacy Provisions of the HITECH Act Implications for Patients and Sm...
Patient Privacy Provisions of the HITECH Act Implications for Patients and Sm...Patient Privacy Provisions of the HITECH Act Implications for Patients and Sm...
Patient Privacy Provisions of the HITECH Act Implications for Patients and Sm...
 
Telehealth Clinical Best Practices Workshop I 5 23-2020
Telehealth Clinical Best Practices Workshop I 5 23-2020Telehealth Clinical Best Practices Workshop I 5 23-2020
Telehealth Clinical Best Practices Workshop I 5 23-2020
 
Business Associate Assessment, Agreement and Requirements
Business Associate Assessment, Agreement and RequirementsBusiness Associate Assessment, Agreement and Requirements
Business Associate Assessment, Agreement and Requirements
 
Protecting PHI with encryption for HIPAA compliance
Protecting PHI with encryption for HIPAA complianceProtecting PHI with encryption for HIPAA compliance
Protecting PHI with encryption for HIPAA compliance
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippa
 

Último

Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 

Último (20)

Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 

Data file.technical drs.hipaa presentation may 2011

  • 1. Notification of Breach Release of Information Discussion Presented By: Janine Akers from DataFile Technologies Technical Doctor, Inc. Connecting Technology & Professionals
  • 2. About DataFile Technologies •Privately Held Kansas City Company •Work with Major EMRs •National Partnership with Multiple Companies Technical Doctor, Inc. Connecting Technology & Professionals
  • 3. Overview • HITECH Act Changes to HIPAA g Notification of Breach • Release of Information Best Practice Resources • How our eROI Services can work for You. Technical Doctor, Inc. Connecting Technology & Professionals
  • 4. Notification of Breach Do we need to notify a patient? Technical Doctor, Inc. Connecting Technology & Professionals
  • 5. HITECH Historical View Brief History of HITECH Act Subtitle D—13400’s Section August 2009 1st Set of Proposed Rules for HIPAA Privacy Privacy, Security and Enforcement Rules February 2010 F b Above proposed rules are finalized July 2010 Above final was recalled and 2nd set of proposed rules were published d l bli h d Technical Doctor, Inc. Connecting Technology & Professionals
  • 6. HITECH Proposed Changes Changes Proposed in Current Comment Period Notice of Privacy Practices Changes to definition of medical necessity Immunization records & deceased records Definitions of electronic media Breaches – Guidance for Significant Risk Technical Doctor, Inc. Connecting Technology & Professionals
  • 7. What is a Breach? How does HITECH Act define a breach? Was the protected health information secure? Do one of the exclusions apply? Is there a significant risk of financial, reputational, or other harm to the individual? Technical Doctor, Inc. Connecting Technology & Professionals
  • 8. The Exclusions What are the exclusions provided by HITECH? Workforce use • Unintentional acquisition, access or use of PHI by a workforce member if the PHI is not further used or disclosed in a manner that violates the Privacy Rule Workforce disclosure • Unintentional disclosure of PHI by a workforce member to another workforce member if the PHI is not further used or disclosed in a manner that violates the Privacy Rule No way to retain the information • Unauthorized di l U th i d disclosure t which th CE or BA h a good to hi h the has d faith belief that the unauthorized person to whom the PHI is disclosed would not reasonably have been able to retain info. Technical Doctor, Inc. Connecting Technology & Professionals
  • 9. Guidance for Significant Risk What guidance is provided by HITECH? Covered Entity to Covered Entity • Inadvertent disclosure of PHI from one covered entity or BA y employee to another similarly situated covered entity or BA employee, provided that PHI is not further used or disclosed in any manner that violates the Privacy Rule. Immediate steps to mitigate • Were immediate steps taken to mitigate the harm including return or destruction of the information and a written confidentiality agreement ? Types of information included • Was the information disclosed limited to the name of the individual indi id al or a limited data set? Technical Doctor, Inc. Connecting Technology & Professionals
  • 10. Notification Components What are the required notification components? A description of what happened including the date of breach and date of discovery y A description of the types of PHI involved Steps the individual should take to protect themselves Steps taken by the provider to investigate, mitigate and protect against further disclosure Contact information for questions including a toll-free telephone number, email address, website or postal address b it t l dd Technical Doctor, Inc. Connecting Technology & Professionals
  • 12. Penalties & Reporting What are the penalties & reporting obligations? Defined d D fi d and enacted b k i F b t d back in February 2009 i in original ARRA/HITECH Act - HIPAA Section to apply to both the Breach and the Notification Nature of Violation Fine Per Violation Annual Maximum Unknowing $100 $25,000 Reasonable Cause $1,000 $100,000 Willful Neglect $10,000 $10 000 $250,000 $250 000 Willful Neglect Not $50,000 $1,500,000 Corrected Technical Doctor, Inc. Connecting Technology & Professionals
  • 13. Reporting Reference Records  Authorized  Proactive approach for preventive  Date Patient Originated  Incident How mistake happened Mistake discovered Mistake rectified and Notification Recipient measures from Clinic After it has been brought to our  Starting with date and  attention that there has been an  Starting with date and  name of employee  oversight, mistake, or HIPAA  supervisor’s name, document  initiating report and  violation (regardless of how big or  Starting with date and  how we will use this occurrence  Patient  Description of  correcting the problem,  Medical  small)‐ we will document, research  resource, describe in  to train the entire staff regarding  Date Name &  Requestor the unique  describe in detail actions  Practice and come to understand what  detail how this mistake  our best practice procedures to  p p DOB occurrence.  taken to correct the  t k t t th happened and describe in detail how  was discovered. prevent the possibility of a  problem and how patient  this occurred.  Include date and  similar occurrence happening  and covered entity were  employee names involved in the  again.   notified.   communication trail. Technical Doctor, Inc. Connecting Technology & Professionals
  • 14. Limit Your Liability • Staff training • Process improvement • Transfer the liability y Technical Doctor, Inc. Connecting Technology & Professionals
  • 15. Why DataFile? Improve customer service Improve customer service Mitigate risk Offer rapid response p p Eliminate training expenses Take fewer calls Technical Doctor, Inc. Connecting Technology & Professionals
  • 17. How It Works: Step 1 1. Establish HIPAA secure network connection Technical Doctor, Inc. Connecting Technology & Professionals
  • 18. How It Works: Step 2 2. Set up a User in the EMR for “DataFile” Technical Doctor, Inc. Connecting Technology & Professionals
  • 19. How It Works: Step 3 3. Scan/attach appropriate Patient and Task or Message to user  “DataFile” Technical Doctor, Inc. Connecting Technology & Professionals
  • 22. The Brass Tacks What is the cost for eROI services? • T i ll Typically… NONE • The variables involved in eROI include – Specialty – Number of Providers – State • Providers can maximize service while eliminating costs with eROI services Technical Doctor, Inc. Connecting Technology & Professionals
  • 23. Questions & Thank You Janine B. Akers, MBA DataFile Technologies, LLC janine.akers@datafiletechnologies.com 816‐437‐9134 Technical Doctor, Inc. Connecting Technology & Professionals