1 of 50

HIPAA Compliance Training Presentation

2 of 50

Introduction to HIPAA

  • HIPAA is the Health Insurance Portability and Accountability Act
    • The law was signed in August of 1996
      • HIPAA regulations directly cover three basic groups of individual or corporate entities
      • Health Plans, HealthCare Providers, and HealthCare Clearinghouse
    • HIPAA was intended to
      • Improve fraud and abuse protections
      • Improve administrative efficiencies
      • Ensure privacy, security & confidentiality of protected health information (PHI)
      • Support the portability of health insurance
    • OCR
      • Office of Civil Rights (Enforces the Privacy Rules)

3 of 50

Key Concepts and Terms

  • Protected Health Information
  • Use and Disclosure
  • Notice and Acknowledgement
  • Authorization
  • Covered Entity
  • Workforce
  • Business Associate
  • Personal Representative
  • Minimum necessary
  • Treatment, Payment, or Operations

4 of 50

Protected Health Information

  • General definition
    • Information that identifies an individual and describes his/her medical condition or treatment
  • Specifically includes
    • Clinical information
    • Information on payment
    • Basic demographic information
    • Name, address, and telephone number
  • Applies to written and electronic information

5 of 50

Use and Disclosure

  • Information is used by Team Members for
    • Collection of information by clinical staff
    • Review of patient charts by clinical staff
    • Completion of billing forms by clerical staff
    • Accounting and bookkeeping entries
  • Information is disclosed when it is shared with others
    • Transmission of information to a health plan
    • Transmission of information to a billing service
    • Transmission of prescriptions to a pharmacy
    • Consultation with an independent provider
    • Reporting to government agencies (Mandated)

6 of 50

Notice and Acknowledgement

  • Notice of Privacy Practices
    • A statement given to each patient describing how our physicians will use and disclose health information and outlining the patient’s rights under HIPAA
  • Acknowledgement
    • Written documentation that the notice was provided to a patient, either signed by the patient or completed by a staff member explaining why the patient did not sign it

7 of 50

Authorization

  • Medical/clinical research
    • Investigational treatment
    • Research protocols
    • Exception for “de-identified” data
  • Marketing
    • Promoting third-party products/services
    • Providing mailing lists to others
  • Other uses and disclosures except
    • For treatment, payment, health care operations
    • To comply with legal mandates

8 of 50

Covered Entity

  • A covered entity
    • A health plan
    • A health care clearinghouse
    • A health care provider that conducts certain health care transactions electronically

9 of 50

Workforce

  • Members of the medical practice
  • Employees of the medical practice
  • Independent contractors we hire

10 of 50

Business Associate

  • An entity that performs services �for the physician
  • Examples:
    • Management Services (Oncure)
    • Billing services
    • Accreditation agencies
  • New Breach Notification Rule
    • Requires the BA to report any breach of PHI to the CE within 60 days of of the discovery of the breach

11 of 50

Personal Representative

  • A person who can act on behalf of the patient
  • Must have legal authority to act �on the patient’s behalf
  • A personal representative may:
    • Acknowledge the Notice of Privacy Practices
    • Authorize use and disclosure of information
    • Request and receive an accounting of use and disclosure
    • Request amendment of health information

12 of 50

Minimum necessary

  • HIPAA limits use and disclosure of protected health information to the ‘minimum necessary’ to accomplish an intended purpose
  • Examples:
    • Any information requested for treatment
    • Any information in a standard transaction
    • Information required by administrative task
    • Information specified in request from government agencies such as
      • Law enforcement officials
      • Regulatory officials
      • Subpoena or court order

13 of 50

Quiz 1: Key Concepts

  • Does protected health information includes the patient’s name, address, and basic demographic information?
  • Do privacy protections apply to both information recorded on paper and information stored electronically?
  • Can a family member or close personal friend act as the representative of the patient?
  • Is a business associate contract required only for those business associates who create, receive or process protected health information?

14 of 50

A Hypothetical Case History

  • The privacy regulation in action: �An overview

15 of 50

A Hypothetical Case History

  • New Patient Flow Process
  • Claim prepared and submitted to health plan
  • Newsletter sent to patients of the practice
  • Mailing list requested by local pharmacy
  • Disclosure Log
  • Access to PHI
  • Amendment to PHI

16 of 50

New Patient Flow Process

  • Making an appointment
    • Collect basic patient information
      • Name
      • Telephone number
      • Health plan
      • Advise the patient to bring a photo ID, or other documentation that will show current address
  • Patient Arrival
    • Patient receives a Registration, Privacy Notice and the Acknowledgement of Notice
      • Original acknowledgement is placed in the chart
      • If the patient refuses or is unable to sign then use the “Good Faith Efforts” form to document why you were unable to obtain the acknowledgement
      • Validate the documentation that identifies the patient and the current address
    • Patient is asked to sign-in on the wait list

17 of 50

Claim Submission

  • Format changes from the standard HCFA 1500 to ASC X12N 837.
  • Referring doctors changed from UPIN to NPI
  • Disclosure of information to health plan
    • Does not require patient authorization
    • Does not violate privacy rules

18 of 50

Mailing lists

  • Must have patient’s permission to sell or provide mailing lists to other organizations

19 of 50

Disclosure Log

  • This form is kept in the patient’s chart with other registration information.
  • New rules will soon require that we have an electronic record of all disclosures
  • The patient is allowed to ask you for a copy of this Disclosure Log every 12 months for free
  • Must retain this log for 6 years and be able to retrieve a copy within 3 days in CA and 30 days in FL if requested.

20 of 50

Patient Access to PHI

  • The patient must request to see the chart in writing. You must respond to request within 30 days.
  • An appointment must be made to see the chart. Patient must not be left alone with the chart EVER. Do not allow the patient the ability to alter the record.
  • You may provide the patient with a summary of the chart if patient agrees to this format.
  • The Physician can deny access if he/she feels it is not in the patients best interest to see the contents of the chart.
  • If denied access, complete the denial letter and mail to the patient placing a copy in the patient’s chart.

21 of 50

Request For Amendment to PHI

  • Patient may request that the records be amended. Patient must request the amendment in writing.
  • If amendment request is denied you must notify the patient using the “Request for Amendment Denial” letter.
  • Mail the original to the patient. Place a copy in the chart.
  • Patient may submit their own 250 words or less addendum, to be placed in the chart.
  • Patient may file a disagreement with DHHS.

22 of 50

Quiz 2: Access and Amendment

  • Can a patient examine his or her medical information?
  • Can a patient obtain a copy of information in his or her medical chart?
  • Do patients have to request information from their records in writing?
  • Can patients change information in their medical records?

23 of 50

Content of Authorization

  • Authorization must…
    • Identify the information to be used or disclosed
    • Identify users/persons to whom disclosed
    • Identify purposes of use or disclosure
    • Note the potential for redisclosure
  • Conditioning treatment on authorization
    • Treatment available only to research subjects
    • Treatment requested by the patient for disclosure
  • Authorization may signed by…
    • Patient, or
    • Patient representative

24 of 50

Obtaining Authorization

  • Review authorization form with patient
    • What information will be used
    • What the information will be used for
    • Who will use the information
  • Note the potential for re-disclosure
  • Obtain patient/representative signature
  • File authorization form in records

25 of 50

Sample-Medical Release of Information Form

  • Authorization to Receive or Release Medical Information
  • (Please fill out completely; incomplete forms may delay processing)
  • Explanation
  • This authorization to receive or release medical information is being requested of you to comply with the terms of the “Authorization I hereby authorize Radiation Oncology Medical Group to furnish to:
  • (name of physician, hospital or healthcare provider)
  • address of physician, hospital or healthcare provider)
  • medical records and information pertaining to medical history, mental or physical condition, services rendered, or treatment for:
  • (Name of Patient) (Social Security Number) (Date of Birth)
  • 3. I understand that I have the right to limit the type of information to be released. I have indicated below the information which is authorized for release:
  • All medical information, without exception, including information regarding AIDS and AIDS testing, psychological or psychiatric treatment and drug or alcohol abuse. This includes doctor’s notes, labs, x-ray and other diagnostic tests.
  • All the medical information except the following:
  • Only the following information:
  • Uses
  • This information supplied is to be used for the following purpose's): _________________________________.
  • Duration
  • This authorization shall become effective immediately and shall remain in effect until (date).
  • 6. Restrictions
  • I understand that the recipient may not further use or disclose the medical information unless another authorization is obtained from me or unless such use or disclosure is specifically required or permitted by law.
  • 8. Additional Copy
  • I understand that I have a right to receive a copy of this authorization.
  • Copy requested and provided:  yes  no
  • I hereby release all parties from any/all legal liability that may arise from the release of this information to the party named above (San Diego Sports Medicine & Orthopedic Center reserves the right to charge for copies of medical records.)

26 of 50

Quiz 3: Authorization

  • Is an authorization needed if a patient has signed a consent to participate in a research program?
  • Does an authorization have to specify the information to be disclosed and the purpose of the disclosure?
  • Does an authorization have to identify who will use or receive the information?
  • Can a patient be denied care if he or she doesn’t authorize use or disclosure of information in a research study?
  • Does a patient have to authorize disclosure of information to himself or herself or to a spouse?

27 of 50

Use and Disclosure of PHI

  • Informing patients of certain uses and disclosures of protected health information

28 of 50

Legally Mandated Disclosures

  • Police and Law Enforcement
  • Public Health Reporting
    • Reportable infectious diseases
    • Vital events (birth and death)
  • Abuse and Neglect Reporting
  • Licensing and regulatory oversight
  • Legal proceedings

29 of 50

Incidental Disclosures

  • Examples of incidental disclosure
    • An overheard conversation among staff members
    • An overheard discussion between staff and patients
    • An overheard telephone call to a patient
    • Test results being filed in patient records
  • Incidental disclosures are permitted…�…but should be avoided
    • Incidental disclosures need not be documented
  • Try to minimize incidental disclosures!
    • Conduct discussions in private areas
    • Limit discussion when others are present

30 of 50

Disclosures to Family Members

  • Disclosure is permitted…
    • To spouses
    • To parents and legal guardians
    • To others involved in care
  • Obtaining patient’s permission
    • When patient is able to object
    • When patient is not able to object
  • Allows sharing of Information related to the patient’s care

31 of 50

Breach Notification Rules

  • Health Information Technology for Economic and Clinical Health Act (the “HITECH Act”) along with HHS as part of the American Recovery and Reinvestment Act of 2009 contains a series of laws that have expanded privacy and security aspect of HIPAA. These rules were published by HHS on August 24, 2009.
    • Breach Reporting Obligations
    • Risk of Harm Standard
    • Notice Requirements
    • Methods of Securing PHI
    • Policies and Procedures

32 of 50

  • On August 24, 2009 the HHS published regulations clarifying the breach reporting obligations and providing guidance on the meaning of “secured” and “unsecured” PHI. Covered Entities and Business Associates are required to report breaches that are discovered after September 23, 2009.
  • In the event of a breach of unsecured data, many steps needs to be taken by the CE including a Risk Assessment will be conducted to determine if the risk poses a significant risk of financial, reputational, or other harm to the individual, and based on the results of the assessment will determine whether it is necessary to notify the individual of the breach. The following factors should be considered during the risk assessment: Nature of the Data Elements Breached, Likelihood the information is accessible and usable, Likelihood the breach may lead to harm and the ability of the entity to mitigate the risk of harm.
  • Notice must be made to the affected individuals “without reasonable delay and in no case later than 60 calendar days after discovery of a breach”. The notice shall be made in writing, except under circumstances where the CE does not have the correct contact information of the individual, or where there is particular urgency to the notification. Notice must contain the following: A brief description of what occurred including dates of the breach and discovery of the breach. A description of the types of unsecured PHI that were disclosed during the breach. A description of the steps the individual should take to protect himself or herself from potential harm caused by the breach. A description of investigation the CE has taken to mitigate the breach and to prevent future breaches. Instructions for the individual to contact the CE. If the breach of unsecured PHI involves more than 500 patients of the state the CE must notify media outlets within that state as well as the Secretary within 60 days of the discovery of the breach. If the breach is less than 500 individuals, the CE shall create a log documenting the breach, and must be sent to the Secretary within 60 days after the end of each calendar year. If the breach occurs at or through a BA the BA must notify the CE of the breach within 60 of discovery so that the CE is able to comply with its breach reporting obligations.
  • The secretary released guidance that render PHI unusable, unreadable, or indecipherable to unauthorized individuals. Some of these methodologies include Encryption, and Destruction of PHI. Simple access controls may render the PHI inaccessible to unauthorized individuals, but don’t render the PHI unusable, unreadable, or indecipherable to unauthorized individuals, thus constitute unsecured PHI for which breach notification is required.
  • It is the responsibility of the CE and BA to have policy and procedures to comply with the HITECH reporting obligations. The policy and procedures must include: Training of all members of the workforce, Sanctions for the members of the workforce that don’t comply with the policy and procedures. A process by which the individuals can make a complaint regarding the entity’s compliance with the breach reporting rules. Prohibition on retaliation against individuals who exercise a right, or file a compliant.

  • Civil monetary penalties for noncompliance can range from $100 ti $50,000 per violation. The maximum penalties that can be applied for additional violations in any one year are within a range of $25,000 to $1,5000.000.

33 of 50

Quiz 4: Using & Disclosure of Information

  • Are there any limits on the use or disclosure of patient information for the purpose of treatment?
  • Does a patient have to authorize the disclosure of information to a health plan?
  • Does a patient have to authorize disclosure of information to law enforcement agencies?
  • Does HIPAA prevent us from complying with state-mandated disease reporting, e.g., for infectious diseases?
  • Can we use patient information for any purpose without obtaining the patient’s authorization?

34 of 50

Information Security

  • Staff responsibilities for keeping information secure

35 of 50

Overview

  • The basic concepts of security
  • The responsibility for security
  • Threats to security
  • Security protections
  • What you can do

36 of 50

Security Basics

  • Two aspects of security
    • Preventing unauthorized access/disclosure
    • Preventing loss of information
  • Scope of security concerns
    • Securing electronic information
    • Securing paper records

37 of 50

Security is Every Employee’s Responsibility

  • Information systems managers & staff
  • Medical professionals
  • Clerical and billing staff
  • Managers and supervisors
  • Consultants and contractors

38 of 50

Security Threats

  • Loss of information
  • Theft of information
  • Unauthorized disclosures
  • Accidental disclosures

39 of 50

Loss of Information

  • Unintended destruction of information
    • Human error
    • Hardware failure
    • Fires, floods, and power failures
    • Computer viruses
  • Response to the threat
    • Staff training and procedures
    • Backup procedures and system design
    • Disaster and contingency plans
    • Anti-virus software

40 of 50

Theft of Information

  • How information is stolen
    • Computer system penetration by hackers
    • Disclosure caused by computer viruses
  • Preventing theft
    • Hardware/software firewalls
    • Use of password protection
    • User authentication
    • Anti-virus software
    • Encryption

41 of 50

Unauthorized Disclosures

  • Intentional, but unauthorized, disclosure
    • Failure to check credentials of requester
    • Failure to check patient authorization
  • Unintentional disclosure
    • Breakdown of security during disasters

42 of 50

Accidental Disclosures

  • Overheard conversations
    • Among staff
    • Between staff and patients
  • Information left in public view
    • Information displayed on computer screens
    • Printed information left on desks
    • Files accessible to public/passers-by

43 of 50

Security Protections

  • Backup procedures
  • Contingency plans
  • Organizational safeguards
  • Technical (hardware and software) safeguards

44 of 50

Guidelines for Computer Use

  • Log on and log off our network
  • Never let others use your user ID
  • Choose a secure password
  • Regularly update your password
  • Never share your password
  • Never write your password down
  • Secure your workstation

45 of 50

Quiz 5: Security Measures

  • Is the accidental destruction of information a security problem?
  • What is the most serious threat �to security?
  • Should people ever let others use their computer ID or password?
  • Should anti-virus software ever be �turned off?

46 of 50

Security & Privacy Wrap-up

  • What you can do to protect the privacy and safeguard the security of patient information

47 of 50

Privacy Wrap-up�Five things you can do to protect privacy

  • Store all patient information securely
  • Discuss patient information in private
  • Avoid unnecessary discussion of patient information
  • Review restrictions on disclosure and communication before making disclosures
  • Confirm credentials of recipients before disclosing protected health information

48 of 50

Security Wrap-up�Five things you can do to safeguard security

  • Log on and log off of your computer
  • Never let others use your log-on
  • Follow guidelines for password use
  • Never disable anti-virus software
  • Never install unapproved software

49 of 50

Why take HIPAA Seriously? Civil and Criminal Penalties

  • Civil sanctions: $100. Per violation up to $25,000 year.
    • Example: Failure to obtain an Acknowledgement of receipt of Privacy Practices or release of information.
  • Criminal sanctions: $50,000, $100,000, $250,000 with 1, 5 or 10 years in Prison
    • Example: Using PHI such as SSN#, obtaining or disclosing unauthorized PHI of another individual. If the violation is committed under false pretenses. The most serious violation would be, the intent to sell or transfer another's PHI for harmful or personal gain.

50 of 50

Final Thoughts

  • Take HIPAA seriously, this program was designed to protect each one of us.
  • When each of you return to your work stations take a few moments look around and answer this question: Is your work space HIPAA compliant?
  • Are you following the HIPAA guidelines outlined for you today?