hipaa privacy and security - ivyleaguenurse.com · 2014-11-12 · addresses federal laws and...

51
PREMIER EDUCATION PROVIDER HIPPA Compliance # 1020 Release Date: 8/28/2012 Updated: 11/11/2014; Expires 11/11/2016 www.IvyLeagueNurse.com Copyright © 2011 HIPAA Privacy and Security Author(s) Kevin Arnold, RN, BSN Disclosures Clinical Specialist, Bard Access Systems IVTAGS, LLC - Owner Audience All health care workers. HIPAA Privacy and Security addresses federal laws and guidelines for protecting and maintaining Protected Health Information. Course ID: 1020 - Credit Hours: 2 Accreditation KLA Education Services LLC is accredited by the State of California Board of Registered Nursing, Provider # CEP16145. Course Objectives After completion of this lesson, participants will be able to: 1. List 5 examples of protected health information (PHI). 2. List 3 Patient’s rights. 3. List 3 examples uses of PHI. 4. List 3 example HIPAA violations. 5. Describe the consequences of HIPAA violations. 6. List 3 patient’s right. 7. List 3 threats to PHI security. 1

Upload: others

Post on 08-Aug-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: HIPAA Privacy and Security - IvyLeagueNurse.com · 2014-11-12 · addresses federal laws and guidelines for protecting and maintaining Protected Health Information. Course ID: 1020

PREMIER EDUCATION PROVIDER

HIPPA Compliance # 1020 Release Date: 8/28/2012

Updated: 11/11/2014; Expires 11/11/2016

www.IvyLeagueNurse.com • Copyright © 2011

HIPAA Privacy and Security

Author(s)

Kevin Arnold, RN, BSN

Disclosures

Clinical Specialist, Bard Access Systems

IVTAGS, LLC - Owner

Audience

All health care workers. HIPAA Privacy and Security addresses federal laws and guidelines for protecting and maintaining Protected Health Information.

Course ID: 1020 - Credit Hours: 2

Accreditation KLA Education Services LLC is accredited by the State of California Board of Registered Nursing, Provider # CEP16145.

Course Objectives After completion of this lesson, participants will be able to: 1. List 5 examples of protected health information (PHI). 2. List 3 Patient’s rights. 3. List 3 examples uses of PHI. 4. List 3 example HIPAA violations. 5. Describe the consequences of HIPAA violations. 6. List 3 patient’s right. 7. List 3 threats to PHI security.

1

Page 2: HIPAA Privacy and Security - IvyLeagueNurse.com · 2014-11-12 · addresses federal laws and guidelines for protecting and maintaining Protected Health Information. Course ID: 1020

PREMIER EDUCATION PROVIDER

HIPPA Compliance # 1020 Release Date: 8/28/2012

Updated: 11/11/2014; Expires 11/11/2016

www.IvyLeagueNurse.com • Copyright © 2011

• HIPAA is the Health Insurance Portability and Accountability Act of 1996.

• HIPAA Privacy – Protection for the privacy of Protected Health Information (PHI) effective

• HIPAA Security – Protection for the security of electronic Protected Health Information

Federal Law

2

Page 3: HIPAA Privacy and Security - IvyLeagueNurse.com · 2014-11-12 · addresses federal laws and guidelines for protecting and maintaining Protected Health Information. Course ID: 1020

PREMIER EDUCATION PROVIDER

HIPPA Compliance # 1020 Release Date: 8/28/2012

Updated: 11/11/2014; Expires 11/11/2016

www.IvyLeagueNurse.com • Copyright © 2011

• Protects the privacy and security of a patient’s health information.

• Provides for electronic and physical security of a patient’s health information.

3

Page 4: HIPAA Privacy and Security - IvyLeagueNurse.com · 2014-11-12 · addresses federal laws and guidelines for protecting and maintaining Protected Health Information. Course ID: 1020

PREMIER EDUCATION PROVIDER

HIPPA Compliance # 1020 Release Date: 8/28/2012

Updated: 11/11/2014; Expires 11/11/2016

www.IvyLeagueNurse.com • Copyright © 2011 4

HIPAA Privacy

Page 5: HIPAA Privacy and Security - IvyLeagueNurse.com · 2014-11-12 · addresses federal laws and guidelines for protecting and maintaining Protected Health Information. Course ID: 1020

PREMIER EDUCATION PROVIDER

HIPPA Compliance # 1020 Release Date: 8/28/2012

Updated: 11/11/2014; Expires 11/11/2016

www.IvyLeagueNurse.com • Copyright © 2011

• Name

• Address (any part)

• Name of employer

• Date of admission, birth

• Date of discharge, death

• Telephone and Fax numbers

• Electronic (email) addresses

• Social Security Number

• Medical Records

• Health Plan Beneficiary Info

5

Sample Protected Health Information (PHI)

• Account number

• Medical record number

• Any vehicle ID number

• Photographic Images

• Medical Hx or Tx

• IP (internet protocol) #

• Web URL

• Certificate / Licenses #

• Finger prints

• Any identifying data

Page 6: HIPAA Privacy and Security - IvyLeagueNurse.com · 2014-11-12 · addresses federal laws and guidelines for protecting and maintaining Protected Health Information. Course ID: 1020

PREMIER EDUCATION PROVIDER

HIPPA Compliance # 1020 Release Date: 8/28/2012

Updated: 11/11/2014; Expires 11/11/2016

www.IvyLeagueNurse.com • Copyright © 2011

• Do not access information unless it is needed to do your job.

• Do not share information with colleagues unless they need it to do their job.

6

Page 7: HIPAA Privacy and Security - IvyLeagueNurse.com · 2014-11-12 · addresses federal laws and guidelines for protecting and maintaining Protected Health Information. Course ID: 1020

PREMIER EDUCATION PROVIDER

HIPPA Compliance # 1020 Release Date: 8/28/2012

Updated: 11/11/2014; Expires 11/11/2016

www.IvyLeagueNurse.com • Copyright © 2011

• Treatment of patient

–Direct patient care

–Coordination of care

–Consultations

–Referrals to health care providers

7

Examples…

Page 8: HIPAA Privacy and Security - IvyLeagueNurse.com · 2014-11-12 · addresses federal laws and guidelines for protecting and maintaining Protected Health Information. Course ID: 1020

PREMIER EDUCATION PROVIDER

HIPPA Compliance # 1020 Release Date: 8/28/2012

Updated: 11/11/2014; Expires 11/11/2016

www.IvyLeagueNurse.com • Copyright © 2011

• Operations

–Administrative activities

–Quality improvement

–Compliance

–Competency

–Training

8

Examples…

Page 9: HIPAA Privacy and Security - IvyLeagueNurse.com · 2014-11-12 · addresses federal laws and guidelines for protecting and maintaining Protected Health Information. Course ID: 1020

PREMIER EDUCATION PROVIDER

HIPPA Compliance # 1020 Release Date: 8/28/2012

Updated: 11/11/2014; Expires 11/11/2016

www.IvyLeagueNurse.com • Copyright © 2011

• Payment of health care bills

–Includes any activities required to bill and collect for health care services.

9

Examples

Page 10: HIPAA Privacy and Security - IvyLeagueNurse.com · 2014-11-12 · addresses federal laws and guidelines for protecting and maintaining Protected Health Information. Course ID: 1020

PREMIER EDUCATION PROVIDER

HIPPA Compliance # 1020 Release Date: 8/28/2012

Updated: 11/11/2014; Expires 11/11/2016

www.IvyLeagueNurse.com • Copyright © 2011

• Disclosures required by law

• Public Health and other governmental reporting

10

Examples…

Page 11: HIPAA Privacy and Security - IvyLeagueNurse.com · 2014-11-12 · addresses federal laws and guidelines for protecting and maintaining Protected Health Information. Course ID: 1020

PREMIER EDUCATION PROVIDER

HIPPA Compliance # 1020 Release Date: 8/28/2012

Updated: 11/11/2014; Expires 11/11/2016

www.IvyLeagueNurse.com • Copyright © 2011

• Verbal

• Paper

• Electronic

11

Method of PHI Communication

Page 12: HIPAA Privacy and Security - IvyLeagueNurse.com · 2014-11-12 · addresses federal laws and guidelines for protecting and maintaining Protected Health Information. Course ID: 1020

PREMIER EDUCATION PROVIDER

HIPPA Compliance # 1020 Release Date: 8/28/2012

Updated: 11/11/2014; Expires 11/11/2016

www.IvyLeagueNurse.com • Copyright © 2011

• When talking make sure you are:

–Sharing with someone who needs PHI for their job.

–Speaking where others can not hear.

–Giving only the minimum PHI necessary

12

Verbal Communication

Page 13: HIPAA Privacy and Security - IvyLeagueNurse.com · 2014-11-12 · addresses federal laws and guidelines for protecting and maintaining Protected Health Information. Course ID: 1020

PREMIER EDUCATION PROVIDER

HIPPA Compliance # 1020 Release Date: 8/28/2012

Updated: 11/11/2014; Expires 11/11/2016

www.IvyLeagueNurse.com • Copyright © 2011

• Nursing services may release a copy of a patients medical record to health care personnel transporting a patient to another health care facility.

• Physicians and Nurses may release some information to a patient

13

Paper Communication

Page 14: HIPAA Privacy and Security - IvyLeagueNurse.com · 2014-11-12 · addresses federal laws and guidelines for protecting and maintaining Protected Health Information. Course ID: 1020

PREMIER EDUCATION PROVIDER

HIPPA Compliance # 1020 Release Date: 8/28/2012

Updated: 11/11/2014; Expires 11/11/2016

www.IvyLeagueNurse.com • Copyright © 2011

• Typically releasing PHI is left to medical records departments.

• Dispose of PHI properly (shred)

14

Paper Communication

Page 15: HIPAA Privacy and Security - IvyLeagueNurse.com · 2014-11-12 · addresses federal laws and guidelines for protecting and maintaining Protected Health Information. Course ID: 1020

PREMIER EDUCATION PROVIDER

HIPPA Compliance # 1020 Release Date: 8/28/2012

Updated: 11/11/2014; Expires 11/11/2016

www.IvyLeagueNurse.com • Copyright © 2011

• Limit faxing to emergent situations

• Always include a cover sheet with a confidentiality notice

• Use secure fax locations

• Faxes sent to inadvertent locations should be reported

15

Paper Communication

Page 16: HIPAA Privacy and Security - IvyLeagueNurse.com · 2014-11-12 · addresses federal laws and guidelines for protecting and maintaining Protected Health Information. Course ID: 1020

PREMIER EDUCATION PROVIDER

HIPPA Compliance # 1020 Release Date: 8/28/2012

Updated: 11/11/2014; Expires 11/11/2016

www.IvyLeagueNurse.com • Copyright © 2011

• PHI should not be left on counters, in conference room, or anywhere it may be accessible to the public or staff that do not need to know the information.

16

Paper Communication

Page 17: HIPAA Privacy and Security - IvyLeagueNurse.com · 2014-11-12 · addresses federal laws and guidelines for protecting and maintaining Protected Health Information. Course ID: 1020

PREMIER EDUCATION PROVIDER

HIPPA Compliance # 1020 Release Date: 8/28/2012

Updated: 11/11/2014; Expires 11/11/2016

www.IvyLeagueNurse.com • Copyright © 2011

• Ensure data is encrypted

–Encryption assures PHI is unreadable to anyone but authorized devices.

• Create strong passwords

• Secure computers and other devices

• Avoid discussion on blogs/threads – Often contain malware, phishing software

17

Protecting Electronic PHI

Page 18: HIPAA Privacy and Security - IvyLeagueNurse.com · 2014-11-12 · addresses federal laws and guidelines for protecting and maintaining Protected Health Information. Course ID: 1020

PREMIER EDUCATION PROVIDER

HIPPA Compliance # 1020 Release Date: 8/28/2012

Updated: 11/11/2014; Expires 11/11/2016

www.IvyLeagueNurse.com • Copyright © 2011

• Malware is software designed to harm your computer (viruses, worms, spyware)

• Phishing is unwanted email or web site requests for confidential information

• Avoid suspicious emails

18

Protecting Electronic PHI

Page 19: HIPAA Privacy and Security - IvyLeagueNurse.com · 2014-11-12 · addresses federal laws and guidelines for protecting and maintaining Protected Health Information. Course ID: 1020

PREMIER EDUCATION PROVIDER

HIPPA Compliance # 1020 Release Date: 8/28/2012

Updated: 11/11/2014; Expires 11/11/2016

www.IvyLeagueNurse.com • Copyright © 2011

• Avoid storage of PHI on “Cloud” servers.

• Cloud servers store information over the internet (Dropbox, TheBox, Google Drive, Apple iCloud)

19

Protecting Electronic PHI

Page 20: HIPAA Privacy and Security - IvyLeagueNurse.com · 2014-11-12 · addresses federal laws and guidelines for protecting and maintaining Protected Health Information. Course ID: 1020

PREMIER EDUCATION PROVIDER

HIPPA Compliance # 1020 Release Date: 8/28/2012

Updated: 11/11/2014; Expires 11/11/2016

www.IvyLeagueNurse.com • Copyright © 2011

• A medical chart left open at a nursing station

• A lost medical record

• PHI on a thumb drive that was lost and not password protected

• A PowerPoint presentation containing PHI given to a department of 20 employees with out proper authorization from the patient.

20

Example Violations…

Page 21: HIPAA Privacy and Security - IvyLeagueNurse.com · 2014-11-12 · addresses federal laws and guidelines for protecting and maintaining Protected Health Information. Course ID: 1020

PREMIER EDUCATION PROVIDER

HIPPA Compliance # 1020 Release Date: 8/28/2012

Updated: 11/11/2014; Expires 11/11/2016

www.IvyLeagueNurse.com • Copyright © 2011

• Informing a patient’s family member of a patient medical diagnosis with out proper authorization.

• A physician and nurse discussing a case in the elevator with others present

• A smart phone containing PHI left on the counter with no pass word protection in place

• PHI on a computer left open and unattended

21

Example Violations…

Page 22: HIPAA Privacy and Security - IvyLeagueNurse.com · 2014-11-12 · addresses federal laws and guidelines for protecting and maintaining Protected Health Information. Course ID: 1020

PREMIER EDUCATION PROVIDER

HIPPA Compliance # 1020 Release Date: 8/28/2012

Updated: 11/11/2014; Expires 11/11/2016

www.IvyLeagueNurse.com • Copyright © 2011

• If you are aware or suspect a violation, report it to the appropriate supervisor or privacy officer.

• Failure to report is a violation.

22

Reporting

Page 23: HIPAA Privacy and Security - IvyLeagueNurse.com · 2014-11-12 · addresses federal laws and guidelines for protecting and maintaining Protected Health Information. Course ID: 1020

PREMIER EDUCATION PROVIDER

HIPPA Compliance # 1020 Release Date: 8/28/2012

Updated: 11/11/2014; Expires 11/11/2016

www.IvyLeagueNurse.com • Copyright © 2011

• $100 per violation, $25,000 for an identical violation within one year

• $50,000 for wrongful disclosure

• $100,000 and/or 5 years in prison for wrongful violation for obtaining PHI under false pretenses

• $250,000 and/or 10 years in prison if committed with intent to sell or transfer for commercial advantage, personal gain, or malicious harm, includes obtaining or disclosing.

23

Consequences

Page 24: HIPAA Privacy and Security - IvyLeagueNurse.com · 2014-11-12 · addresses federal laws and guidelines for protecting and maintaining Protected Health Information. Course ID: 1020

PREMIER EDUCATION PROVIDER

HIPPA Compliance # 1020 Release Date: 8/28/2012

Updated: 11/11/2014; Expires 11/11/2016

www.IvyLeagueNurse.com • Copyright © 2011

• Before contacting a patient, make sure the patient does not have an approved request for an alternative method or location for communications.

• You should NOT leave PHI on answering machines, voice mails

24

Contacting Patients

Page 25: HIPAA Privacy and Security - IvyLeagueNurse.com · 2014-11-12 · addresses federal laws and guidelines for protecting and maintaining Protected Health Information. Course ID: 1020

PREMIER EDUCATION PROVIDER

HIPPA Compliance # 1020 Release Date: 8/28/2012

Updated: 11/11/2014; Expires 11/11/2016

www.IvyLeagueNurse.com • Copyright © 2011

• Appointment reminders made by telephone must be limited to: • Patient’s Name

• Caller’s Name

• Location

• Date and Time of appointment

• A call back number for further questions

• Do not disclose other details.

25

Contacting Patients

Page 26: HIPAA Privacy and Security - IvyLeagueNurse.com · 2014-11-12 · addresses federal laws and guidelines for protecting and maintaining Protected Health Information. Course ID: 1020

PREMIER EDUCATION PROVIDER

HIPPA Compliance # 1020 Release Date: 8/28/2012

Updated: 11/11/2014; Expires 11/11/2016

www.IvyLeagueNurse.com • Copyright © 2011

• The right to request restriction of PHI uses & disclosures

• The right to request alternative forms of communications

• The right to access and copy patient’s PHI

• The right to an accounting of the disclosures of PHI

• The right to request amendments to information

26

Patient’s Rights

Page 27: HIPAA Privacy and Security - IvyLeagueNurse.com · 2014-11-12 · addresses federal laws and guidelines for protecting and maintaining Protected Health Information. Course ID: 1020

PREMIER EDUCATION PROVIDER

HIPPA Compliance # 1020 Release Date: 8/28/2012

Updated: 11/11/2014; Expires 11/11/2016

www.IvyLeagueNurse.com • Copyright © 2011

• Patients may opt out at the time of admission and at any time. – His/her information will not be shared with outside callers

or visitors

– The patient is not included in the patient list maintained by the Hospital telephone operators

– If a patient “opts out” of the patient list, callers or visitors should be told, “I have no information available on that person.”

• All patients admitted to a Psychiatry service

are typically automatically opted out. 27

Patient's Right to Opt Out

Page 28: HIPAA Privacy and Security - IvyLeagueNurse.com · 2014-11-12 · addresses federal laws and guidelines for protecting and maintaining Protected Health Information. Course ID: 1020

PREMIER EDUCATION PROVIDER

HIPPA Compliance # 1020 Release Date: 8/28/2012

Updated: 11/11/2014; Expires 11/11/2016

www.IvyLeagueNurse.com • Copyright © 2011

• Typical Approved Disclosure to the Public –The patient’s location –The patient’s general condition

“stable”, “serious”, or “critical”

28

What is okay?

Page 29: HIPAA Privacy and Security - IvyLeagueNurse.com · 2014-11-12 · addresses federal laws and guidelines for protecting and maintaining Protected Health Information. Course ID: 1020

PREMIER EDUCATION PROVIDER

HIPPA Compliance # 1020 Release Date: 8/28/2012

Updated: 11/11/2014; Expires 11/11/2016

www.IvyLeagueNurse.com • Copyright © 2011

• When Mr. Thomas is admitted, he signs a General Consent for treatment and does not choose to “opt out” of any areas. He calls her nurse upset because he just received a phone call from someone he did not want to know he was in the hospital.

• Should this person’s information have

been disclosed?

29

Question?

Page 30: HIPAA Privacy and Security - IvyLeagueNurse.com · 2014-11-12 · addresses federal laws and guidelines for protecting and maintaining Protected Health Information. Course ID: 1020

PREMIER EDUCATION PROVIDER

HIPPA Compliance # 1020 Release Date: 8/28/2012

Updated: 11/11/2014; Expires 11/11/2016

www.IvyLeagueNurse.com • Copyright © 2011

• Since Mr. Thomas did not choose to “opt out” of the patient directory, callers inquiring about him by name would receive confirmation of his admission and general information about his condition.

30

Answer…

Page 31: HIPAA Privacy and Security - IvyLeagueNurse.com · 2014-11-12 · addresses federal laws and guidelines for protecting and maintaining Protected Health Information. Course ID: 1020

PREMIER EDUCATION PROVIDER

HIPPA Compliance # 1020 Release Date: 8/28/2012

Updated: 11/11/2014; Expires 11/11/2016

www.IvyLeagueNurse.com • Copyright © 2011

• A patient drops by the nursing station as he is being discharged to get a copy of his medical records. Michelle, a business associate, accesses the patient’s medical record and prints a complete copy for the patient to take with him.

• Should Michelle have given the patient a copy of his medical record?

31

Question?

Page 32: HIPAA Privacy and Security - IvyLeagueNurse.com · 2014-11-12 · addresses federal laws and guidelines for protecting and maintaining Protected Health Information. Course ID: 1020

PREMIER EDUCATION PROVIDER

HIPPA Compliance # 1020 Release Date: 8/28/2012

Updated: 11/11/2014; Expires 11/11/2016

www.IvyLeagueNurse.com • Copyright © 2011

• NO, Michelle should have advised the patient to obtain a copy from the medical records office.

32

Answer…

Page 33: HIPAA Privacy and Security - IvyLeagueNurse.com · 2014-11-12 · addresses federal laws and guidelines for protecting and maintaining Protected Health Information. Course ID: 1020

PREMIER EDUCATION PROVIDER

HIPPA Compliance # 1020 Release Date: 8/28/2012

Updated: 11/11/2014; Expires 11/11/2016

www.IvyLeagueNurse.com • Copyright © 2011

• Kathy calls a patient to remind them about and appointment.

– “ Hi, this is Kathy calling for James Henderson to remind you about your appointment tomorrow morning at 9:00AM. You may call me back at 555-1234 with any questions.”

• Was this message appropriate?

33

Question?

Page 34: HIPAA Privacy and Security - IvyLeagueNurse.com · 2014-11-12 · addresses federal laws and guidelines for protecting and maintaining Protected Health Information. Course ID: 1020

PREMIER EDUCATION PROVIDER

HIPPA Compliance # 1020 Release Date: 8/28/2012

Updated: 11/11/2014; Expires 11/11/2016

www.IvyLeagueNurse.com • Copyright © 2011

• Yes, Kathy did not identify the clinic or any sensitive medical information…only the necessary data for the appointment.

34

Answer…

Page 35: HIPAA Privacy and Security - IvyLeagueNurse.com · 2014-11-12 · addresses federal laws and guidelines for protecting and maintaining Protected Health Information. Course ID: 1020

PREMIER EDUCATION PROVIDER

HIPPA Compliance # 1020 Release Date: 8/28/2012

Updated: 11/11/2014; Expires 11/11/2016

www.IvyLeagueNurse.com • Copyright © 2011

• Jack answers a phone call asking about the health status of Mrs. Owens. Jack looks up but does not see Mrs. Owens on the patient on the unit’s roster. Jack knows Mrs. Owens is doing fine and about to be discharged from listening to the morning report. Jack tell the caller he can’t say medial details, but she is doing okay.

• Was this the appropriate response?

35

Question?

Page 36: HIPAA Privacy and Security - IvyLeagueNurse.com · 2014-11-12 · addresses federal laws and guidelines for protecting and maintaining Protected Health Information. Course ID: 1020

PREMIER EDUCATION PROVIDER

HIPPA Compliance # 1020 Release Date: 8/28/2012

Updated: 11/11/2014; Expires 11/11/2016

www.IvyLeagueNurse.com • Copyright © 2011

• NO, Jack should have known a patient not listed on the roster was a “no information patient.” Many patients “opt out” and do not want it known they are in the hospital. Jack should have said “I’m sorry but I have no information on that person.”

36

Answer…

Page 37: HIPAA Privacy and Security - IvyLeagueNurse.com · 2014-11-12 · addresses federal laws and guidelines for protecting and maintaining Protected Health Information. Course ID: 1020

PREMIER EDUCATION PROVIDER

HIPPA Compliance # 1020 Release Date: 8/28/2012

Updated: 11/11/2014; Expires 11/11/2016

www.IvyLeagueNurse.com • Copyright © 2011

• You are an RN working in the MICU. One of your best friend’s wife is in an auto accident and gets admitted to the Emergency Department. Your friend calls you to see if you look up her chart and make sure you agree with the treatment she is being given.

• What can you do to help?

37

Question…

Page 38: HIPAA Privacy and Security - IvyLeagueNurse.com · 2014-11-12 · addresses federal laws and guidelines for protecting and maintaining Protected Health Information. Course ID: 1020

PREMIER EDUCATION PROVIDER

HIPPA Compliance # 1020 Release Date: 8/28/2012

Updated: 11/11/2014; Expires 11/11/2016

www.IvyLeagueNurse.com • Copyright © 2011

• You are only allowed to view information needed to do your job. Since you are not caring for this patient, you may not look up the chart or ask someone else to access it on your behalf.

38

Answer…

Page 39: HIPAA Privacy and Security - IvyLeagueNurse.com · 2014-11-12 · addresses federal laws and guidelines for protecting and maintaining Protected Health Information. Course ID: 1020

PREMIER EDUCATION PROVIDER

HIPPA Compliance # 1020 Release Date: 8/28/2012

Updated: 11/11/2014; Expires 11/11/2016

www.IvyLeagueNurse.com • Copyright © 2011 39

HIPAA Security

Page 40: HIPAA Privacy and Security - IvyLeagueNurse.com · 2014-11-12 · addresses federal laws and guidelines for protecting and maintaining Protected Health Information. Course ID: 1020

PREMIER EDUCATION PROVIDER

HIPPA Compliance # 1020 Release Date: 8/28/2012

Updated: 11/11/2014; Expires 11/11/2016

www.IvyLeagueNurse.com • Copyright © 2011

• Computer-based patient health information that is used, created, stored, received or transmitted.

• Information in an electronic medical record, patient billing information, digital images, etc.

• Ensure confidentiality (no disclosure) of PHI.

• Ensure integrity (no alteration) of PHI.

40

Electronic Security of PHI

Page 41: HIPAA Privacy and Security - IvyLeagueNurse.com · 2014-11-12 · addresses federal laws and guidelines for protecting and maintaining Protected Health Information. Course ID: 1020

PREMIER EDUCATION PROVIDER

HIPPA Compliance # 1020 Release Date: 8/28/2012

Updated: 11/11/2014; Expires 11/11/2016

www.IvyLeagueNurse.com • Copyright © 2011

• Never share your username or password

• Never use someone else’s username or password

• Change passwords often or per facility protocol

41

Usernames and Passwords

Page 42: HIPAA Privacy and Security - IvyLeagueNurse.com · 2014-11-12 · addresses federal laws and guidelines for protecting and maintaining Protected Health Information. Course ID: 1020

PREMIER EDUCATION PROVIDER

HIPPA Compliance # 1020 Release Date: 8/28/2012

Updated: 11/11/2014; Expires 11/11/2016

www.IvyLeagueNurse.com • Copyright © 2011

• Use encryption

• Avoid use of personal email accounts

42

Email

Page 43: HIPAA Privacy and Security - IvyLeagueNurse.com · 2014-11-12 · addresses federal laws and guidelines for protecting and maintaining Protected Health Information. Course ID: 1020

PREMIER EDUCATION PROVIDER

HIPPA Compliance # 1020 Release Date: 8/28/2012

Updated: 11/11/2014; Expires 11/11/2016

www.IvyLeagueNurse.com • Copyright © 2011

• Log off or lock work stations when unattended

• Make use of auto-lock features when possible

• Use screen savers or security screen protectors possible

43

Work Areas

Page 44: HIPAA Privacy and Security - IvyLeagueNurse.com · 2014-11-12 · addresses federal laws and guidelines for protecting and maintaining Protected Health Information. Course ID: 1020

PREMIER EDUCATION PROVIDER

HIPPA Compliance # 1020 Release Date: 8/28/2012

Updated: 11/11/2014; Expires 11/11/2016

www.IvyLeagueNurse.com • Copyright © 2011

• Suspicious emails

–From names you do not recognize

–Phishing links

–Attachments

44

Threats

Page 45: HIPAA Privacy and Security - IvyLeagueNurse.com · 2014-11-12 · addresses federal laws and guidelines for protecting and maintaining Protected Health Information. Course ID: 1020

PREMIER EDUCATION PROVIDER

HIPPA Compliance # 1020 Release Date: 8/28/2012

Updated: 11/11/2014; Expires 11/11/2016

www.IvyLeagueNurse.com • Copyright © 2011

• Remote Access Trojans

–Remote uses may access your computer without your permission or with out you knowing

–May steal PHI from your computer

45

Threats

Page 46: HIPAA Privacy and Security - IvyLeagueNurse.com · 2014-11-12 · addresses federal laws and guidelines for protecting and maintaining Protected Health Information. Course ID: 1020

PREMIER EDUCATION PROVIDER

HIPPA Compliance # 1020 Release Date: 8/28/2012

Updated: 11/11/2014; Expires 11/11/2016

www.IvyLeagueNurse.com • Copyright © 2011

• Worms

–Viruses that take advantage of network security holes and spread throughout an internal network of computers

46

Threats

Page 47: HIPAA Privacy and Security - IvyLeagueNurse.com · 2014-11-12 · addresses federal laws and guidelines for protecting and maintaining Protected Health Information. Course ID: 1020

PREMIER EDUCATION PROVIDER

HIPPA Compliance # 1020 Release Date: 8/28/2012

Updated: 11/11/2014; Expires 11/11/2016

www.IvyLeagueNurse.com • Copyright © 2011

• Spyware

–Virus software that can monitor your computer usage and collect data to an external location. Often causes multiple out of control pop up advertisements.

47

Threats

Page 48: HIPAA Privacy and Security - IvyLeagueNurse.com · 2014-11-12 · addresses federal laws and guidelines for protecting and maintaining Protected Health Information. Course ID: 1020

PREMIER EDUCATION PROVIDER

HIPPA Compliance # 1020 Release Date: 8/28/2012

Updated: 11/11/2014; Expires 11/11/2016

www.IvyLeagueNurse.com • Copyright © 2011

• Keystroke Loggers

–Virus software that can record every keystroke on you computer and collected to an external location. Often serve as an attempt to record usernames and passwords.

48

Threats

Page 49: HIPAA Privacy and Security - IvyLeagueNurse.com · 2014-11-12 · addresses federal laws and guidelines for protecting and maintaining Protected Health Information. Course ID: 1020

PREMIER EDUCATION PROVIDER

HIPPA Compliance # 1020 Release Date: 8/28/2012

Updated: 11/11/2014; Expires 11/11/2016

www.IvyLeagueNurse.com • Copyright © 2011

• Help to keep anti-virus software up to date

• Use of internet firewalls is recommended

49

Anti-Threat Measures

Page 50: HIPAA Privacy and Security - IvyLeagueNurse.com · 2014-11-12 · addresses federal laws and guidelines for protecting and maintaining Protected Health Information. Course ID: 1020

PREMIER EDUCATION PROVIDER

HIPPA Compliance # 1020 Release Date: 8/28/2012

Updated: 11/11/2014; Expires 11/11/2016

www.IvyLeagueNurse.com • Copyright © 2011

• Avoid long term storage of PHI on portable devices such as:

– USB storage devices

– Laptops

– iPads

– Smart phones

– PDAs

• Destroy PHI when it is no longer needed.

50

Portable Devices

Page 51: HIPAA Privacy and Security - IvyLeagueNurse.com · 2014-11-12 · addresses federal laws and guidelines for protecting and maintaining Protected Health Information. Course ID: 1020

PREMIER EDUCATION PROVIDER

HIPPA Compliance # 1020 Release Date: 8/28/2012

Updated: 11/11/2014; Expires 11/11/2016

www.IvyLeagueNurse.com • Copyright © 2011

• American Recovery and Reinvestment Act of 2009, Title XIII Health Information Technology for Economic and Clinical Health, Subtitle D, Privacy

• Guidance Specifying the Technologies and Methodologies that Render Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals

• Health Insurance Portability and Accountability Act of 1996 (HIPAA)

• NIST SP 800-30, Risk Management Guide for Information Technology System

• OCR website: Summary of HIPAA Privacy Rule

• OCR website: Summary of HIPAA Security Rule

51

References