HIPAA is the Health Insurance Portability and Accountability Act
The law was signed in August of 1996
HIPAA regulations directly cover three basic groups of individual or corporate entities
Health Plans, HealthCare Providers, and HealthCare Clearinghouse
HIPAA was intended to
Improve fraud and abuse protections
Improve administrative efficiencies
Ensure privacy, security & confidentiality of protected health information (PHI)
Support the portability of health insurance
OCR
Office of Civil Rights (Enforces the Privacy Rules)
3 of 50
Key Concepts and Terms
Protected Health Information
Use and Disclosure
Notice and Acknowledgement
Authorization
Covered Entity
Workforce
Business Associate
Personal Representative
Minimum necessary
Treatment, Payment, or Operations
4 of 50
Protected Health Information
General definition
Information that identifies an individual and describes his/her medical condition or treatment
Specifically includes
Clinical information
Information on payment
Basic demographic information
Name, address, and telephone number
Applies to written and electronic information
5 of 50
Use and Disclosure
Information is used by Team Members for
Collection of information by clinical staff
Review of patient charts by clinical staff
Completion of billing forms by clerical staff
Accounting and bookkeeping entries
Information is disclosed when it is shared with others
Transmission of information to a health plan
Transmission of information to a billing service
Transmission of prescriptions to a pharmacy
Consultation with an independent provider
Reporting to government agencies (Mandated)
6 of 50
Notice and Acknowledgement
Notice of Privacy Practices
A statement given to each patient describing how our physicians will use and disclose health information and outlining the patient’s rights under HIPAA
Acknowledgement
Written documentation that the notice was provided to a patient, either signed by the patient or completed by a staff member explaining why the patient did not sign it
7 of 50
Authorization
Medical/clinical research
Investigational treatment
Research protocols
Exception for “de-identified” data
Marketing
Promoting third-party products/services
Providing mailing lists to others
Other uses and disclosures except
For treatment, payment, health care operations
To comply with legal mandates
8 of 50
Covered Entity
A covered entity
A health plan
A health care clearinghouse
A health care provider that conducts certain health care transactions electronically
9 of 50
Workforce
Members of the medical practice
Employees of the medical practice
Independent contractors we hire
10 of 50
Business Associate
An entity that performs services �for the physician
Examples:
Management Services (Oncure)
Billing services
Accreditation agencies
New Breach Notification Rule
Requires the BA to report any breach of PHI to the CE within 60 days of of the discovery of the breach
11 of 50
Personal Representative
A person who can act on behalf of the patient
Must have legal authority to act �on the patient’s behalf
A personal representative may:
Acknowledge the Notice of Privacy Practices
Authorize use and disclosure of information
Request and receive an accounting of use and disclosure
Request amendment of health information
12 of 50
Minimum necessary
HIPAA limits use and disclosure of protected health information to the ‘minimum necessary’ to accomplish an intended purpose
Examples:
Any information requested for treatment
Any information in a standard transaction
Information required by administrative task
Information specified in request from government agencies such as
Law enforcement officials
Regulatory officials
Subpoena or court order
13 of 50
Quiz 1: Key Concepts
Does protected health information includes the patient’s name, address, and basic demographic information?
Do privacy protections apply to both information recorded on paper and information stored electronically?
Can a family member or close personal friend act as the representative of the patient?
Is a business associate contract required only for those business associates who create, receive or process protected health information?
14 of 50
A Hypothetical Case History
The privacy regulation in action: �An overview
15 of 50
A Hypothetical Case History
New Patient Flow Process
Claim prepared and submitted to health plan
Newsletter sent to patients of the practice
Mailing list requested by local pharmacy
Disclosure Log
Access to PHI
Amendment to PHI
16 of 50
New Patient Flow Process
Making an appointment
Collect basic patient information
Name
Telephone number
Health plan
Advise the patient to bring a photo ID, or other documentation that will show current address
Patient Arrival
Patient receives a Registration, Privacy Notice and the Acknowledgement of Notice
Original acknowledgement is placed in the chart
If the patient refuses or is unable to sign then use the “Good Faith Efforts” form to document why you were unable to obtain the acknowledgement
Validate the documentation that identifies the patient and the current address
Patient is asked to sign-in on the wait list
17 of 50
Claim Submission
Format changes from the standard HCFA 1500 to ASC X12N 837.
Referring doctors changed from UPIN to NPI
Disclosure of information to health plan
Does not require patient authorization
Does not violate privacy rules
18 of 50
Mailing lists
Must have patient’s permission to sell or provide mailing lists to other organizations
19 of 50
Disclosure Log
This form is kept in the patient’s chart with other registration information.
New rules will soon require that we have an electronic record of all disclosures
The patient is allowed to ask you for a copy of this Disclosure Log every 12 months for free
Must retain this log for 6 years and be able to retrieve a copy within 3 days in CA and 30 days in FL if requested.
20 of 50
Patient Access to PHI
The patient must request to see the chart in writing. You must respond to request within 30 days.
An appointment must be made to see the chart. Patient must not be left alone with the chart EVER. Do not allow the patient the ability to alter the record.
You may provide the patient with a summary of the chart if patient agrees to this format.
The Physician can deny access if he/she feels it is not in the patients best interest to see the contents of the chart.
If denied access, complete the denial letter and mail to the patient placing a copy in the patient’s chart.
21 of 50
Request For Amendment to PHI
Patient may request that the records be amended. Patient must request the amendment in writing.
If amendment request is denied you must notify the patient using the “Request for Amendment Denial” letter.
Mail the original to the patient. Place a copy in the chart.
Patient may submit their own 250 words or less addendum, to be placed in the chart.
Patient may file a disagreement with DHHS.
22 of 50
Quiz 2: Access and Amendment
Can a patient examine his or her medical information?
Can a patient obtain a copy of information in his or her medical chart?
Do patients have to request information from their records in writing?
Can patients change information in their medical records?
23 of 50
Content of Authorization
Authorization must…
Identify the information to be used or disclosed
Identify users/persons to whom disclosed
Identify purposes of use or disclosure
Note the potential for redisclosure
Conditioning treatment on authorization
Treatment available only to research subjects
Treatment requested by the patient for disclosure
Authorization may signed by…
Patient, or
Patient representative
24 of 50
Obtaining Authorization
Review authorization form with patient
What information will be used
What the information will be used for
Who will use the information
Note the potential for re-disclosure
Obtain patient/representative signature
File authorization form in records
25 of 50
Sample-Medical Release of Information Form
Authorization to Receive or Release Medical Information
(Please fill out completely; incomplete forms may delay processing)
Explanation
This authorization to receive or release medical information is being requested of you to comply with the terms of the “Authorization I hereby authorize Radiation Oncology Medical Group to furnish to:
(name of physician, hospital or healthcare provider)
address of physician, hospital or healthcare provider)
medical records and information pertaining to medical history, mental or physical condition, services rendered, or treatment for:
(Name of Patient) (Social Security Number) (Date of Birth)
3. I understand that I have the right to limit the type of information to be released. I have indicated below the information which is authorized for release:
All medical information, without exception, including information regarding AIDS and AIDS testing, psychological or psychiatric treatment and drug or alcohol abuse. This includes doctor’s notes, labs, x-ray and other diagnostic tests.
All the medical information exceptthe following:
Only the following information:
Uses
This information supplied is to be used for the following purpose's): _________________________________.
Duration
This authorization shall become effective immediately and shall remain in effect until (date).
6. Restrictions
I understand that the recipient may not further use or disclose the medical information unless another authorization is obtained from me or unless such use or disclosure is specifically required or permitted by law.
8. Additional Copy
I understand that I have a right to receive a copy of this authorization.
Copy requested and provided: yes no
I hereby release all parties from any/all legal liability that may arise from the release of this information to the party named above (San Diego Sports Medicine & Orthopedic Center reserves the right to charge for copies of medical records.)
26 of 50
Quiz 3: Authorization
Is an authorization needed if a patient has signed a consent to participate in a research program?
Does an authorization have to specify the information to be disclosed and the purpose of the disclosure?
Does an authorization have to identify who will use or receive the information?
Can a patient be denied care if he or she doesn’t authorize use or disclosure of information in a research study?
Does a patient have to authorize disclosure of information to himself or herself or to a spouse?
27 of 50
Use and Disclosure of PHI
Informing patients of certain uses and disclosures of protected health information
28 of 50
Legally Mandated Disclosures
Police and Law Enforcement
Public Health Reporting
Reportable infectious diseases
Vital events (birth and death)
Abuse and Neglect Reporting
Licensing and regulatory oversight
Legal proceedings
29 of 50
Incidental Disclosures
Examples of incidental disclosure
An overheard conversation among staff members
An overheard discussion between staff and patients
An overheard telephone call to a patient
Test results being filed in patient records
Incidental disclosures are permitted…�…but should be avoided
Incidental disclosures need not be documented
Try to minimize incidental disclosures!
Conduct discussions in private areas
Limit discussion when others are present
30 of 50
Disclosures to Family Members
Disclosure is permitted…
To spouses
To parents and legal guardians
To others involved in care
Obtaining patient’s permission
When patient is able to object
When patient is not able to object
Allows sharing of Information related to the patient’s care
31 of 50
Breach Notification Rules
Health Information Technology for Economic and Clinical Health Act (the “HITECH Act”) along with HHS as part of the American Recovery and Reinvestment Act of 2009 contains a series of laws that have expanded privacy and security aspect of HIPAA. These rules were published by HHS on August 24, 2009.
Breach Reporting Obligations
Risk of Harm Standard
Notice Requirements
Methods of Securing PHI
Policies and Procedures
32 of 50
On August 24, 2009 the HHS published regulations clarifying the breach reporting obligations and providing guidance on the meaning of “secured” and “unsecured” PHI. Covered Entities and Business Associates are required to report breaches that are discovered after September 23, 2009.
In the event of a breach of unsecured data, many steps needs to be taken by the CE including a Risk Assessment will be conducted to determine if the risk poses a significant risk of financial, reputational, or other harm to the individual, and based on the results of the assessment will determine whether it is necessary to notify the individual of the breach. The following factors should be considered during the risk assessment: Nature of the Data Elements Breached, Likelihood the information is accessible and usable, Likelihood the breach may lead to harm and the ability of the entity to mitigate the risk of harm.
Notice must be made to the affected individuals “without reasonable delay and in no case later than 60 calendar days after discovery of a breach”. The notice shall be made in writing, except under circumstances where the CE does not have the correct contact information of the individual, or where there is particular urgency to the notification. Notice must contain the following: A brief description of what occurred including dates of the breach and discovery of the breach. A description of the types of unsecured PHI that were disclosed during the breach. A description of the steps the individual should take to protect himself or herself from potential harm caused by the breach. A description of investigation the CE has taken to mitigate the breach and to prevent future breaches. Instructions for the individual to contact the CE. If the breach of unsecured PHI involves more than 500 patients of the state the CE must notify media outlets within that state as well as the Secretary within 60 days of the discovery of the breach. If the breach is less than 500 individuals, the CE shall create a log documenting the breach, and must be sent to the Secretary within 60 days after the end of each calendar year. If the breach occurs at or through a BA the BA must notify the CE of the breach within 60 of discovery so that the CE is able to comply with its breach reporting obligations.
The secretary released guidance that render PHI unusable, unreadable, or indecipherable to unauthorized individuals. Some of these methodologies include Encryption, and Destruction of PHI. Simple access controls may render the PHI inaccessible to unauthorized individuals, but don’t render the PHI unusable, unreadable, or indecipherable to unauthorized individuals, thus constitute unsecured PHI for which breach notification is required.
It is the responsibility of the CE and BA to have policy and procedures to comply with the HITECH reporting obligations. The policy and procedures must include: Training of all members of the workforce, Sanctions for the members of the workforce that don’t comply with the policy and procedures. A process by which the individuals can make a complaint regarding the entity’s compliance with the breach reporting rules. Prohibition on retaliation against individuals who exercise a right, or file a compliant.
Civil monetary penalties for noncompliance can range from $100 ti $50,000 per violation. The maximum penalties that can be applied for additional violations in any one year are within a range of $25,000 to $1,5000.000.
33 of 50
Quiz 4: Using & Disclosure of Information
Are there any limits on the use or disclosure of patient information for the purpose of treatment?
Does a patient have to authorize the disclosure of information to a health plan?
Does a patient have to authorize disclosure of information to law enforcement agencies?
Does HIPAA prevent us from complying with state-mandated disease reporting, e.g., for infectious diseases?
Can we use patient information for any purpose without obtaining the patient’s authorization?
34 of 50
Information Security
Staff responsibilities for keeping information secure
35 of 50
Overview
The basic concepts of security
The responsibility for security
Threats to security
Security protections
What you can do
36 of 50
Security Basics
Two aspects of security
Preventing unauthorized access/disclosure
Preventing loss of information
Scope of security concerns
Securing electronic information
Securing paper records
37 of 50
Security is Every Employee’s Responsibility
Information systems managers & staff
Medical professionals
Clerical and billing staff
Managers and supervisors
Consultants and contractors
38 of 50
Security Threats
Loss of information
Theft of information
Unauthorized disclosures
Accidental disclosures
39 of 50
Loss of Information
Unintended destruction of information
Human error
Hardware failure
Fires, floods, and power failures
Computer viruses
Response to the threat
Staff training and procedures
Backup procedures and system design
Disaster and contingency plans
Anti-virus software
40 of 50
Theft of Information
How information is stolen
Computer system penetration by hackers
Disclosure caused by computer viruses
Preventing theft
Hardware/software firewalls
Use of password protection
User authentication
Anti-virus software
Encryption
41 of 50
Unauthorized Disclosures
Intentional, but unauthorized, disclosure
Failure to check credentials of requester
Failure to check patient authorization
Unintentional disclosure
Breakdown of security during disasters
42 of 50
Accidental Disclosures
Overheard conversations
Among staff
Between staff and patients
Information left in public view
Information displayed on computer screens
Printed information left on desks
Files accessible to public/passers-by
43 of 50
Security Protections
Backup procedures
Contingency plans
Organizational safeguards
Technical (hardware and software) safeguards
44 of 50
Guidelines for Computer Use
Log on and log off our network
Never let others use your user ID
Choose a secure password
Regularly update your password
Never share your password
Never write your password down
Secure your workstation
45 of 50
Quiz 5: Security Measures
Is the accidental destruction of information a security problem?
What is the most serious threat �to security?
Should people ever let others use their computer ID or password?
Should anti-virus software ever be �turned off?
46 of 50
Security & Privacy Wrap-up
What you can do to protect the privacy and safeguard the security of patient information
47 of 50
Privacy Wrap-up�Five things you can do to protect privacy
Store all patient information securely
Discuss patient information in private
Avoid unnecessary discussion of patient information
Review restrictions on disclosure and communication before making disclosures
Confirm credentials of recipients before disclosing protected health information
48 of 50
Security Wrap-up�Five things you can do to safeguard security
Log on and log off of your computer
Never let others use your log-on
Follow guidelines for password use
Never disable anti-virus software
Never install unapproved software
49 of 50
Why take HIPAA Seriously? Civil and Criminal Penalties
Civil sanctions: $100. Per violation up to $25,000 year.
Example: Failure to obtain an Acknowledgement of receipt of Privacy Practices or release of information.
Criminal sanctions: $50,000, $100,000, $250,000 with 1, 5 or 10 years in Prison
Example: Using PHI such as SSN#, obtaining or disclosing unauthorized PHI of another individual. If the violation is committed under false pretenses. The most serious violation would be, the intent to sell or transfer another's PHI for harmful or personal gain.
50 of 50
Final Thoughts
Take HIPAA seriously, this program was designed to protect each one of us.
When each of you return to your work stations take a few moments look around and answer this question: Is your work space HIPAA compliant?
Are you following the HIPAA guidelines outlined for you today?