1 / 26

Stony Brook Health Sciences Center Melissa Pinero HIPAA Privacy Officer 631-444-2148

Stony Brook Health Sciences Center Melissa Pinero HIPAA Privacy Officer 631-444-2148. Health Sciences Center Schools New Employee & Student Training. FERPA Family Education Rights & Privacy Act HIPAA Health Insurance Portability & Accountability Act. FERPA

huy
Download Presentation

Stony Brook Health Sciences Center Melissa Pinero HIPAA Privacy Officer 631-444-2148

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Stony Brook Health Sciences Center Melissa Pinero HIPAA Privacy Officer 631-444-2148

  2. Health Sciences Center Schools New Employee & Student Training FERPA Family Education Rights & Privacy Act HIPAA Health Insurance Portability & Accountability Act

  3. FERPA The Family Education Rights & Privacy Act (20 U.S.C. §1232g:34 CFR Part 99) is a Federal law that protects the privacy of student education records. The law applies to all schools that receive funds under an applicable program of the US Dept of Education. FERPA gives parents certain rights with respect to their children’s education records. These rights transfer to the student when he or she reaches the age of 18 or attends a school beyond the high school level. Students to whom the rights have transferred are “eligible students.”

  4. HIPAA is…… The Health Insurance Portability and Accountability Act of 1996

  5. Portability Created to ensure access to health coverage Allows for continuity in health coverage Prevents denial due to a pre-existing condition(s)

  6. Accountability • Healthcare fraud is a federal crime • Fines and / or jail time may apply • Individuals and organizations face sanctions

  7. The HIPAA Privacy Rules & HITECH 2010

  8. What is HITECH? • On February 17, 2009, the Federal Stimulus Bill or American Recovery and Reinvestment Act (ARRA) was signed into law and included provisions to address Health Information Technology and Economic and Clinical Health Act (HITECH) • Purpose is to create a national health information infrastructure and widespread adoption of electronic health records through monetary incentives. • Provide enhanced Privacy & Security Protections under HIPAA including increased legal liability for non-compliance and greater enforcement.

  9. PHI is a culmination of data that is specific to individual patients. This data can be used to identify: • A patient • A patient’s health • Health care services received by a patient

  10. Privacy Goals We need to: • Maintain our patient’s trust. • Educate our patients as to their rights. • Safeguard our patient’s PHI.

  11. HIPAA18 Elements Necessary for De-identification ofPatient Data Before Presenting the Case in ClassThe following data must be removed for de-identification: • Name • Location; all geographic subdivisions smaller than a state, including street address, city, county, precinct, zip code, and their equivalent geocodes. • Dates (all dates related to the subject of the information, e.g. birth dates, admission dates, discharge dates, encounter dates, surgery dates, etc.) • Telephone numbers • Fax numbers • Electronic mail addresses • Social security numbers • Medical record numbers • Health plan beneficiary numbers • Account numbers • Certificate / license numbers • Vehicle identifiers and serial numbers, including license plate numbers • Device identifiers and serial numbers • Web Universal Resource Locators (URLs) • Internet Protocol (IP) address numbers • Biometric identifiers, including finger and voice prints • Full face photographic images and any comparable images • Any other unique identifying number, characteristic, or code • The following data may be used: • Age (age 90 and over must be aggregated to prevent the identification of older individuals) • Race • Ethnicity • Marital status • Codes (a random or fictional code may be used to link cases or re-identify the health information at a later time; codes may not be a derivative of the individual’s social security number or other identifiable numerical codes, e.g. birth date, fax number, etc.)

  12. Authorization Authorization is required when disclosing PHI for purposes other than treatment, payment, or operations.

  13. Patients Rights Under HIPAA • request restricted use and disclosure of PHI; • inspect and copy their health information; • request to amend their medical record; • request an accounting of disclosures; and • file a complaint.

  14. How is HIPAA Enforced? • Civil monetary penalty: Civil penalty for inadvertent violation= fines of $100/per incident up to $25,000/per year for each similar offense. Example: A hospital employee violates HIPAA by misdialing a fax number and sending 100 patient records to Starbucks. The hospital & the employee may have to pay a $10,000 ($100 x 100) fine.

  15. Worse Case Scenario • Criminal Penalties: Criminal penalties= large fines + jail time, and increase with the degree of the offense. Example: A hospital employee steals and sells patient information for personal profit. Criminal penalties could be as much as $1.5 million and / or 10 years in jail.

  16. Security Health Insurance Portability and Accountability Act HIPAA Electronic Security to Ensure Privacy, Trust, and Quality Care Edward W. Hines Information Security Officer, SBUMC, HSC, and Dental School

  17. What is Security The Protection of Electronic and Physical Assets Merriam-Webster Measures taken to guard against espionage or sabotage, crime, attack, or escape an organization or department who task is security.

  18. The best way to protect yourself…make your passwords difficult to guess NEVER tell anyone your password NEVERwrite your password down, such as on a post-it note. Don’t use common info about you or your family, pets, or friends names, Soc. Sec #;birthdates; anniversary, credit card number; telephone number, etc. Don’t use names you have used before, variation of your user ID, or something significant about yourself as a password. Don’t let someone see what you are entering as your password. If you thing there is even a slight chance someone knows your password, CHANGE IT !! Remember if someone logs on as you and does something improper, you can be held responsible.

  19. Removable Media If lost, removable media can allow unscrupulous people access to confidential patient information. Removable drives can also introduce malicious software to the network. USB drives, CD-RW, and any other flash media must be approved by the ISO If you need to take your work home, do it safely from home and request a VPN account…..

  20. Understanding Ethics and Compliance

  21. Ethics are based on…… • Values • Morals • Integrity • Knowledge of Right vs. Wrong

  22. What is a Compliance Program? A Compliance Program is a system to detect and prevent violations of law or policy. An effective Compliance Program will: -Promote an ethical environment -Reduce risks -Improve operational efficiency -Ensure quality of care -Promote a strong control environment

  23. Ethical Business Practices Refrain from Misrepresentations -Remember to keep it honest (e.g. Falsification of documentation= violation) “Doing the right thing each and every time, even when no one is watching.”

  24. Ethical Business Practices Avoid Conflicts of Interest…. • SBU property should never be used for personal business. • Employees should not supervise family members.

  25. Reporting of Possible Violations • Where to Report: Immediate Supervisor, Departmental Chain of Command, or Compliance Officer • What to Report: An actual or reasonable belief of a violation • Consequences of Reporting: No retaliation or discipline for reporting in good faith • Investigations of Violations: All allegations of wrongdoing will be assessed and investigated • Discipline for Violations: In accordance with labor union contracts, and may include termination.

  26. Call the Compliance HOTLINE (631) 444-6666

More Related