90
HIPAA/HITECH Privacy and Security Student Training Academic Year 2014-2015

HIPAA/HITECH Privacy and Security

Embed Size (px)

DESCRIPTION

HIPAA/HITECH Privacy and Security. Student Training Academic Year 2014-2015. Introduction. Welcome to HIPAA/HITECH Privacy and Security training. - PowerPoint PPT Presentation

Citation preview

Information Privacy and Security

HIPAA/HITECH Privacy and SecurityStudent TrainingAcademic Year 2014-2015 IntroductionWelcome to HIPAA/HITECH Privacy and Security training.

As you may know, all health care organizations are required to comply with HIPAA/HITECH Privacy and Security Regulations. These regulations have undergone several updates, the latest of which were enacted in 2013. As UConn Health School of Medicine, School of Dental Medicine, and graduate students you most likely will have access to patients confidential health information and, therefore, are required to complete HIPAA/HITECH education.

Thank you for completing this important training. Continuation in your educational program is contingent upon completion of this training.When it comes to privacy and accountability, people always demand the former for themselves and the latter for everyone else. David Brinkley

UConn Healths Confidentiality PolicyAll individuals are expected to be professional and maintain confidentiality at all times, whether dealing with actual records, projects, or conversations.

All individuals having access to confidential information are bound by strict ethical and legal restrictions..

Refer to UCHC policy # 2002-43 ConfidentialityWhat types of information must UCHC protect? Medical/Dental/Behavioral Health-related patient informationResearch data requiring protections (clinical trials, patient survey responses, etc.) as required by the NIH.Student information.Employee human resources and financial information.Any information about employees, students, patients, Board Members, etc. which includes Social Security numbers.Financial information IDs and/or Passwords for access to UConn Health computing resources.Other confidential or sensitive UConn Health information not in the public domain.

HIPAA/HITECH Privacy and SecurityHIPAA at a GlanceHIPAA stands for: Health Insurance Portability and Accountability Act

The Health Insurance Portability(HIP) part of HIPAA was intended to ensure the continuity of health insurance coverage for workers changing jobs.To facilitate this goal, Congress mandated national standards for transmitting and protecting health information.

The Accountability part of HIPAA was designed to ensure the security and confidentiality of patient information/data and requires uniform standards for electronic transmission of data relating to patient health information.HIPAA PrivacyThe HIPAA Privacy Rule was enacted to:establish national privacy protection standards for all forms of health information created by covered entities, including health care providers. set limits on the uses and disclosures of such information.give patients rights over their health records.

HIPAA SecurityThe HIPAA Security Rule was enacted to:establish national standards for the security of electronic health information (ePHI).protect individuals ePHI that is created, received, used or maintained by covered entities.outline administrative, technical and physical procedures to ensure the confidentiality, integrity and availability of ePHI.

What is HITECH?HITECH stands for: Health Information Technology for Economic and Clinical Health ActIt is part of the American Recovery and Reinvestment Act (ARRA).Interim rule enacted in 2009.Widened the scope of privacy and security protections under HIPAA.Included health care information technology incentives such as:creating a national health care infrastructure. adopting an electronic health record (EHR) system.The HITECH final rule was enacted in January, 2013.Made a significant number of changes to HIPAA Privacy and Security.

Weve Come a Long Way..MaybeElectronic data transmission is a double edged sword.More technology = increased vulnerability of personal information.As technology changes we have to do more to protect that information.The confidential information we come in contact with everyday is only as safe as our weakest link.What is Protected Health Information (PHI)?Any type of individually identifiable health information in any format including:Paper or other mediaVerbalPhotographed or duplicatedElectronically maintained and/or transmitted

What makes PHI identifiable? Name AddressZip CodeTelephone number Fax numberPhotographsFingerprintsEmail addressInternet address

Dates Social Security Number Medical Record Number Patient Account NumberInsurance Plan NumbersVehicle InformationLicense NumbersMedical Equipment Numbers

Any unique number, code or characteristic that links information to a specific individual such as:

What is de-identified information?Information in which specific pieces (identifiers) have been removed so that it cannot be linked to any individual or be re-identified.If patient information is de-identified it is not considered PHI and is not protected under the HIPAA privacy regulations.

Refer to UCHC Policy # 2003-29: Creation, Use and Disclosure of De-identified PHI

Which of the following is not considered Protected Health Information (PHI) under HIPAA:

A. An EKG report for a participant in a human subject research study.

B. A discharge summary for a John Dempsey Hospital patient.

C. A photo used for medical student education showing only a wound on the hand of an unidentified patient.

D. A patient invoice that includes a listing of diagnostic lab tests completed.

Knowledge CheckThe correct answer is C. Information that cannot be linked in any way to a particular individual would not be considered PHI.15Genetic InformationGenetic information, including family history, is considered PHI under HIPAA.Includes:genetic tests, requests for genetic services, or participation in clinical research that includes genetic services by an individual or his/her family member. any manifestation of a disease in the individuals family member.Genetic information may not be used for underwriting purposes.Protecting PHIAll health information that can be linked in any way to an individual must be protected under HIPAA.As an institution, UConn Health has an obligation to protect the privacy of patient information and maintain the security of that information on our electronic systems.Everyone must be vigilant in their efforts to handle confidential information in a way that prevents improper exposure. HIPAA is ultimately about patients and their right to expect protection of their health information.

Patient Rights under HIPAAPatient RightsPatients have the right to:Receive an accounting of certain disclosures of PHI.View and obtain copies of their records.Request an amendment to their medical records.Request that any communication related to PHI be directed to a specific location.Request restrictions on the use or sharing of their information.Receive the UConn Health Notice of Privacy Practices (NPP) outlining these rights.

Patient Right to an Accounting of DisclosuresUpon request, patients must be provided a list of all PHI disclosures made outside of the institution including:disclosures of which the patient may not otherwise be aware.improper disclosures resulting in a breach.

An accounting of such disclosures is maintained in the patients medical record on the Protected Health Information Disclosure Tracking Log

Patient Right to an Accounting of Disclosures(continued)Disclosures exempt from the accounting requirement include:those for treatment, payment or healthcare operations (TPO).those directed to the patient or in response to the patients authorization.

Refer to UCHC policy # 2003-18: Accounting of Disclosures of Protected Health Information to Patients and to the Protected Health Information Disclosure Tracking Log

Any access, use or disclosure of a patients PHI that is determined to be a breach must be logged on the Protected Health Information Disclosure Tracking Log.

TrueFalse Knowledge Check

The correct answer is True.22Patient Right to View His/Her RecordPatients have a right to view their records upon request.

Only written requests using the UCHC Request to View Record/Notification of Approval or Denial to View form are accepted.

Requests are reviewed with the patients attending of record to determine whether the request will be honored.

UConn Health and the physician will provide a written response to the patient regarding any request denial.

Original records are the property of UConn Health and may not be removed from the facility except by court order.

Refer to UCHC policy #2003-17-A: Patient Right to View His/Her Medical and/or Billing Record

Patient Right to Obtain a Copy of His/Her Medical/Dental or Billing RecordsPatients also have the right to request copies of their PHI in any form they choose or is mutually agreed upon provided PHI is readily producible in that format.

If PHI is maintained electronically UConn Health is required to provide an electronic copy at the patients request.

However, UConn Health is not required to provide unlimited format choices.

Refer to UCHC policy #2003-17-B: Patient Right to Copy His/Her Medical and/or Billing Record

Patient Right to Send Record Copies to OthersPatients may also request that copies of their medical records be sent to other designated individuals.

Requests must be made in writing, clearly identifying the designated recipient and where to send the copy.

Records may be provided in an unencrypted form if the patient understands the risk and agrees in writing.

It is recommended that records not be sent via email.

Patient Requests for Record CopiesPatient requests for record copies must be addressed (granted or denied) within 30 days.A one time 30 day extension is allowed with patient notification.

A reasonable, cost-based fee may be charged.

Requests for record copies may be denied under certain circumstances.Patients have a right to appeal a denial.

Patient Right to Amend His/Her Medical RecordPatients can request corrections be made to any inaccurate or incomplete information in their medical, research, or billing records.Only written requests are accepted.A request to amend may be denied.The patient may write a disagreement to which UConn Health may write a rebuttal.Copies of all such documentation are maintained in the patients record.

Refer to UCHC policy #2003-17-C: Patient Right to Amend Their Medical and/or Billing Record and Request for Amendment of Health Information form.

Patient Right to Confidential CommunicationsUConn Health must honor all patient requests to receive communications of PHI from UConn Health by alternative means or at alternative locations.

Follow the steps outlined in UCHC policy #2003-15 Patient Right to Request Confidential Communications

Patient Right to Restrict Disclosures to Health Care Plans UConn Health must honor patient requests to restrict certain disclosures of PHI to health plans if:

the disclosure is to carry out payment or healthcare operations.

the disclosure is not required by law.

the PHI pertains solely to a health care item or service for which the patient or other person has paid out of pocket and in full.

Notice of Privacy Practices (NPP)The Notice of Privacy Practices is UConn Healths pledge to patients to keep their medical, dental and billing information private.

The NPP describes to patients:How their PHI is used and disclosed.Their rights regarding health information.How to exercise those rights.

Notice of Privacy Practices (NPP)The NPP must be:provided to all patients (excluding inmate/patients)acknowledged by anyone receiving the notice.posted in a prominent location.available on UConn Healths website.

Refer to UCHC policy # 2003-13: Permission to Treat/Assignment of Benefits/Authorization to Release Medical/Dental Records/Acknowledgment of Receipt: Notice of Privacy Practices (Privacy and Security of Protected Health Information (PHI)

Patient Authorizations Regarding Their PHISharing PHI Without Authorization: Remember TPOIn order to access, use or share PHI without a signed patient authorization the purpose must be related to:Treatment within and between healthcare providers across UCHC or in the community.Payment for treatmentOperations i.e. normal UConn Health business activities:Quality improvementTrainingAudit/legal/compliance reviewsEvaluating caregiver performance

Sharing PHI without AuthorizationOther than TPO, Protected Health Information (PHI) may be shared without a signed authorization for the following reasons: Public Health ActivitiesPreventing or controlling diseaseReporting abuse, neglect or domestic violenceFDA-regulated product safetyTo provide information to coroners, medical examiners, or funeral directors.

Refer to UCHC policy #2003-27: Use and Disclosure of PHI Where Authorization or Opportunity for Patient to Agree or Object is NOT Required

Sharing PHI without AuthorizationReasons other than TPO (continued):Organ donation.Health oversight activities:AuditsCivil, administrative, or criminal investigationsInspectionsCourt order or subpoena.For law enforcement purposes related to crimes, provided certain criteria are met.Disclosure of Patient Information to the Public and Community Clergy MembersUnless a patient objects, UConn Health may disclose that patients location (hospital room and telephone number) to persons that inquire about that patient by name.

Members of the clergy will also be provided with a patients religious affiliation unless the patient objects.

Refer to UCHC policy #2003-26: Directory Information: Disclosure of a Patients Information

Communicating with a Patients Family and FriendsPHI should never be shared with a patients family member, friend or others involved in a patients care unless the patient has given permission to do so.

A patient can indicate during a discussion with caregivers that a particular person may be included in that discussion of medical and/or financial information.

If a patient is unable to communicate his/her wishes for any reason, UConn Health may determine whether a particular disclosure is in the best interest of the patient.

Refer to policy # 2003-25: Use and Disclosure Involving Family and Friends

Knowledge CheckMaria is a dental student and has assisted with a procedure in the dental surgery center. The patients neighbor has arrived to give the patient a ride home after the procedure and is waiting with the patient. Maria needs to review some information with the patient related to the procedure and follow-up recommendations but she isnt sure if the patient has given permission to communicate with her neighbor. What should she do?

Review the information privately with the neighbor first since she is taking the patient home.Review the information with the patient and neighbor together since the patient must approve if the neighbor is in the room.Ask the patients permission to review the information in front of her neighbor.Discharge the patient and plan to review the information during her next clinic appointment.

The correct answer is C. Unless you are sure the patient has given permission to communicate PHI with another individual always check with the patient before sharing any information. 38Disclosures Regarding DecedentsCare providers may disclose PHI to a family member or person who was involved in the care of a deceased patient unless otherwise expressed by the decedent while he or she was alive.

Use your knowledge or best judgment regarding disclosure.

HIPAA will no longer apply to individuals deceased more than 50 years.

When is a patient authorization required?In general, if the reason for access, use, or disclosure of information is not related to TPO you must have a signed patient authorization.

Never access, use or disclose PHI without a patients consent, if indicated.

Refer to UCHC policy # 2003-16: Authorization for Release of Information and associated authorization form.

Patient AuthorizationsA valid authorization includes specific requirements:PHI to be releasedWho may release the informationWho may receive the informationPurpose of the disclosureExpiration dateSignature of patient or patient representativeUse only UConn Health HIPAA-compliant authorization forms.A patient may withdraw authorization at any time except to the extent that UConn Health has already used or released information under a valid authorization.

Refer to policy # 2003-16: Authorization for Release of Information.

A signed patient authorization gives UCHC permission to disclose any and all parts of a patient record.

TrueFalseKnowledge Check

The correct answer is false. The patient authorization specifies which parts of the medical record may be shared. Only disclose those sections indicted unless the patient has given permission to share the entire record.42Protecting Confidential Patient InformationMinimum Necessary RuleExcept for treatment purposes, limit access, use or disclosure of PHI to the minimum necessary to accomplish the intended purpose.Access, use or disclose:Only PHI needed to complete an assigned task in your student role andOnly when the specific PHI is necessary to perform that task.Unless you need certain patient information to carry out your student responsibilities, do not access that information.

Refer to policy # 2003-21: Minimum Necessary Data

Students friends and family: Access and DisclosureUnless required for a specific treatment-related task, students may not:Access familys or friends information, even if they ask you to do so.Access supervisors or other residents/students information, even if they ask you to do so.Students may not disclose patient information to anyone that is not authorized to have the PHI including:FamilyFriends/neighborsFellow studentsUConn Health policy prohibits students who are also patients from accessing their own medical information for personal reasons.Verifying Information RequestsBefore sharing any PHI, UConn Health must verify:The identity of the individual requesting the information.That this individual has the right to obtain the information requested.If a patient calls to obtain information about him/herself, UConn Health will verify the individuals identity using information available in the Patient Registration system.In the event that an individuals identity and/or legal authority cannot be verified, UConn Health staff members will not disclose the PHI and will report the request to their immediate supervisor.

Refer to policy # 2003-20: Verification of Individuals or Entities Requesting Disclosure of Protected Health Information

Verbal Exchanges Involving PHIDiscuss PHI only with those that have a need to know for specific assigned job functions.

Be aware of your surroundings when discussing patient information.

Move to a private area if needed.

Avoid discussions involving PHI in areas where you may be overheard such as cafeterias, hallways, elevators, patient waiting rooms etc.While eating lunch in the cafeteria, you overhear a group of students and residents discussing a patient they saw on rounds that morning. You hear them reviewing the patients diagnosis, prognosis and treatment plan. You notice other employees as well as visitors at nearby tables.

What should you do?

Move to another table so you wont hear the discussion.

Stare at the group in hopes that they get the message to end their conversation.

Politely remind them that they should not discuss patients in a public area.

Sit down and join them since the discussion sounds really interesting.

Knowledge CheckThe correct answer is C. Patient information should only be discussed in a private area and only with those that have a right to know the information.

48Telephone/Voicemail/Answering Machine Disclosure of PHINever leave information containing PHI over the phone with someone other than the patient. Leave only generic information on voicemail or answering machines.Never leave any PHI, including indication of the services being performed or the service provider.

Refer to UCHC policy # 2003-24: Telephone/Voicemail/Answering Machine Disclosure of PHI

49Sarah works in the Cancer Center. At the request of her patient, she calls the patient to report her recent lab results. The patient has indicated on the UConn Health Permission to Communicate form that information may be shared with her husband, who she has identified by name. When Sarah calls the patients home, she reaches the patients sister who tells her that the patient is not at home. What should Sarah do?

Hang up and call back at another time.Tell the patients sister that she is calling from UConn Health and ask that the patient return her call.Tell the patients sister that she is calling from the UConn Health Cancer Center with lab results and ask that the patient call her back.Ask the sister to get a pen and paper to write down the results to give to the patient.Knowledge Check

The correct answer is B. Never leave a message containing specific information if the patient has not given permission to communicate with that particular individual.50Managing Written PHIDocuments containing PHI must be:Turned face down when not in use.Kept locked in an office, file cabinet or other storage location.Check printers, fax machines and copiers after using to ensure that no papers are left behind. Never remove paper documents containing PHI from any facility.

Mailing PHIIf it is necessary to mail PHI outside of UConn Health, before doing so you must:

Confirm that you are mailing documents to the intended recipient and that the PHI may be permissibly disclosed to that individual or entity.

Ensure that the recipients name and address are accurate and that the address on the envelope matches the address of the intended recipient.

Check all documents to see that no other patients PHI is included by mistake.

Be sure that no PHI is visible outside of the envelope or in an address window.Faxing PHIFaxing patient information outside of UConn Health is allowed in situations when health information is needed immediately or when mail or courier delivery will not meet a necessary timeframe.

Employees authorized to fax PHI must confirm the accuracy of the fax numbers and security of recipient machines.

Any fax that is sent to a location outside of UConn Health must be accompanied by a UConn Health-approved fax cover sheet.Faxing PHIFax machines used to receive or transmit health information must be located in a secure area to protect the information from unauthorized users.

Receiving faxes:Schedule with the sender whenever possible so that the faxed documents can be promptly removed from the fax machine.Notify the sender if you receive a misdirected fax so the fax can be sent to the correct party.

Refer to UCHC policy # 2003-23: Faxing of Protected Health Information and fax cover sheet.

Disposal of Paper Containing PHIDispose of documents with PHI (faxes, printed emails, informal notes or copies of patient notes) either by tearing them up or placing in secured shredder bins.Never dispose of documents containing PHI in a trash or recycle receptacle or in a publicly accessible area.Copies of PHI used for case presentations or other academic requirements must be destroyed in a confidential manner.

Refer to policy # 2008-01: Disposal of Documents/Materials Containing PHI and Receipt, Tracking and Disposal of Equipment and Electronic Media Containing Electronic Protected Health Information.

Managing Electronic Information

You can't hold firewalls and intrusion detection systems accountable. You can only hold people accountable.Daryl White

Acceptable Use of UConn Healths Information Technology ResourcesUConn Health workforce members are responsible for the appropriate use and security of ePHI when using any IT resource. Using IT resources that are unauthorized or that could disrupt operations or compromise security is prohibited.

Refer to policy # 2011-02: UCHC Information Security: Acceptable Use

Data Authentication and Physical SafeguardsTo protect from unauthorized access, IT resources must be physically secured.Never leave computers or laptops unattended or unsecured in public areas. Where feasible, authentication to systems or devices containing ePHI must:Include a unique logon or password.Be encrypted.

Refer to policy # 2011-01: UCHC Information Security: Data Authentication, Physical Safeguards

Access Control to FacilitiesUConn Health limits physical access to all confidential information, including to the facilities in which it is housed.

Lock all file cabinets and rooms that contain confidential information.

Always wear your UConn Health identification badge for proper access.

Refer to policy # 2005-04: UCHC HIPAA Security Facility Access Control

Virus ProtectionAll computer equipment connected to the UConn Health network must:have UConn Health approved, updated anti-virus protection software installed.remain current with the manufacturers operating systems security software updates.

Refer to policy # 2005-10: UCHC HIPAA Security Virus Protection Policy

Mobile Computing Devices (MCD)MCDs include: UConn Health laptop computersSmartphonesTablet devices USB storage devicesConfidential data may not be stored on UConn Health or non-UConn Health MCDs unless:Only information needed for a particular function is stored.Information is stored only for the time period needed to perform that function.The device is encrypted by UConn Health IT.Data is protected from unauthorized access and disclosure.

Bring Your Own Device (BYOD)Users will be granted the authority to configure their personally-owned MCDs to access UConn Healths electronic information.Personally-owned MCDs must be registered and secured at UConn Healths BYOD website.

Additional information about BYOD can be found at http://its.uchc.edu/Help/BYOD.aspx

Refer to policy # 2008-03: Mobile Computing Device (MCD) Security

Disposing of Electronic Confidential InformationSecure methods must be used to dispose of electronic data and output.Prior to the removal or sale of any electronic storage media/devices, contact the UConn Health Materials Management Department to remove all UConn Health information, including PHI, residing on the devices.Never leave computers/laptops or other devices unattended when planning disposal.

Refer to policy # 2008-01: Disposal of Documents/Materials Containing PHI and Receipt, Tracking and Disposal of Equipment and Electronic Media Containing Electronic Protected Health Information.Electronic Systems Access ControlAccess to UConn Healths information systems is granted only to appropriately identified, validated and authorized individuals.Users must each have a unique login and password. Memorize your password and do not share your account information (username/password), password creation or password changes. Do not log in to your computer to allow a fellow student to work under your username or request that another student do the same for you.

Bert and Ernie are medical students and friends that are each completing a rotation in the Internal Medicine Clinic. Ernie runs into a problem with his username and password and finds that he cannot log onto the computer to write his patient note. To save time, he asks to borrow Berts username and password until he has a moment to contact the IT Helpdesk. What should Bert do?

Give Ernie his username and password to log on.Offer to log on himself to allow Ernie to write his note.Explain to Ernie that UConn Health policy does not allow him to share his username and password.Get another student to log on and let Ernie complete his note.

Knowledge Check

The correct answer is C. Never allow another student to use your password or ask to use a fellow students log on information. You are responsible for any documentation completed under your username and password.65Electronic Systems Access ControlEnsure that all laptops are encrypted as required by UConn Health policy.Always log off your computer or use a screen saver after using a shared computer or when your computer is left unattended.You may be held responsible for improper access by another individual under your username and password.

Refer to policy # 2011-03: UCHC Information Security: Systems Access Control

Electronic PHI (ePHI)ePHI is Protected Health Information stored on electronic systems or transmitted through electronic means.Includes personal information stored on:Personal Computers with internal hard drives.Removable storage devices such as:USB memory sticks/keysCDs/DVDsDisksBack-up tapesExternal hard drivesMobile DevicesElectronic transmission is data exchanged via the network, including wireless and DSL/cable home network connections.

Electronic PHI (ePHI)ePHI also includes patient information located on any UConn Health electronic information management system including:IDX LCR eHIMS NextGen IBEX Others

Monitoring of Electronic Patient Information SystemsAccess to patient records is logged by each UConn Health system.

Audit logs are reviewed to ensure information is accessed only on a need to know basis.

If you do not have a legitimate educational purpose for accessing a patients PHI you are not allowed to view that information.

Think before you clickMinimum necessary also applies to electronic PHI.

Access/use PHI stored in electronic systems only when it is necessary to perform your assigned job functions.

Access/use only the minimum necessary PHI to complete your assigned task.

Jack, a medical student, is searching in an electronic system for the record of a patient. The patient happens to have the same last name as a fellow student, Jill. During his search he sees Jills name on the list of patients and notes that she has a medical record in the system. Jack is curious about Jills medical information so he looks and finds that she recently had surgery. Did Jack do the right thing?

Since Jack inadvertently discovered that Jill is a patient, its OK to view her record.Jack may view Jills medical record, but he shouldnt tell her that he knows she had surgery.Because Jill is a student, she cannot expect her information to be kept private. Anyone with access to a patient information system is allowed to access her record.Jack may not access any patients record, unless the reason is specifically related to his student responsibilities.Knowledge Check

The correct answer is D. Students who are also UConn Health patients are entitled to the same privacy as any patient.

71Patient PortalsSeveral patient portals are in use or under development across UConn Health including John Dempsey Hospital, University Medical Group and School of Dental Medicine clinics. The primary purpose of a patient portal is to:Allow patients to view, download or print to certain parts of their medical records such as lab results and medications.Increase communication between patients and providers.Enable patients to be more involved in their treatment.Improve patient/provider partnerships in the delivery of care.

Emailing PHIHand deliver or mail PHI whenever possible.When necessary for treatment, payment or operations, email PHI only to individuals that are authorized to receive the information.E-mail only from and to secure addresses with the UConn Health network (i.e. addresses ending in uchc.edu) Verify the recipients address as secure before sending PHI via e-mail. Email encryption must be used to send any confidential information outside of the UConn Health network.

Refer to policies: # 2012-01 E-mail Communication with Patients/Research Participants

# 2011-04 Electronic Communication of UCHC Confidential Data: Use of Email Encryption

Using Email EncryptionTo send a secure email:Click the icon in the upper left hand corner of the email message screen ORInclude [secure] (brackets and the word) in the email subject line.

[secure]An outside practitioner will be treating a UConn Health patient. The practitioner sends you an email asking for a summary of the patients condition and treatment.

Which of the following should you do?Simply reply with the details.Reply with the details clicking the Secure button prior to sending the email.Reply with the details typing [secure] in the message.Either B or C.

Knowledge Check

The correct answer is D. Always click the Secure button or type [secure] when sending PHI outside of the institution via email.

75Texting PHITexting confidential information, including PHI, is not permitted unless a secure text application, approved by UConn Health, is installed and active.

Without appropriate software, text messages are not encrypted and, therefore, are never secure.

Sending any text message containing confidential information, including PHI, without using an approved secure text application, is a violation of UConn Health policy, state and federal laws and must be reported immediately.

Social MediaPHI or other confidential information should never be shared on social media sites.

Any medical/dental information that is posted must be completely de-identified.

Although you may think information has been de-identified, it may be possible to identify an individual, even with minimal information.

Knowledge Check

Dennis is a medical student who recently assisted in treating a patient in the UConn Health Emergency Department (ED) that had been involved in a serious car accident. The accident was reported on the local news and on the front page of several newspapers. Dennis cant wait to tell his friends about his ED experience so he posts details about the accident, the patients injuries and a picture he took with his cell phone on his Facebook page. He is careful not to disclose the patients name or to expose the patients face but assumes it is OK to share other information including the patients age, sex and town he lives in.

Did Dennis breach this patients confidentiality.

YesNoThe correct answer is Yes. Even though he did not include the patients name or photo of the patients face, it is possible for others reading Dennis post to identify the patient, given the fact that the accident was highly publicized and the information Dennis did share. Information which could even remotely identify a patient should never be shared via social media. 78Managing Breaches of PHIBreachesA breach is defined as any improper access, acquisition, use or disclosure of PHI that compromises the security or privacy of the information unless it can be proven that the risk of compromise to the information is low.Includes situations in which more than the minimum necessary PHI is involved.

All potential breaches are evaluated by UConn Health and may result in notifying the affected patient(s) and the Federal Office for Civil Rights (OCR).OCR may investigate any breach that is reported.Managing BreachesKnown or suspected breaches must be acted upon without delay to assess the situation and mitigate risk.There are strict timeframes for notifying:Affected patient(s)Office for Civil Rights If you know or suspect that a breach has occurred, report the incident to your preceptor or a UConn Health department manager immediately. The Privacy and/or Security Office will be notified and provide guidance.

Examples of Breaches that Have Occurred at UConn HealthPaper:Lab requisitions, test results or other confidential communication mailed to the incorrect patient.Discharge paperwork handed to the wrong patient.Paperwork containing PHI left in public areas (cafeteria, rest rooms, parking lots).

Verbal:Discussing a patients medical information in a public area.Discussing a patients medical information in front of others without the patients permission to communicate.

Examples of Breaches that Have Occurred at UConn HealthElectronicAccessing patient information for purposes that are not related to job functions, educational responsibilities and/or assigned tasks including the PHI of:co-workers family members friendsVIPs.Lost unencrypted laptops or other mobile devices containing PHI.Texting PHI without appropriate security safeguards in place.Computer screens with PHI visible to unauthorized individuals. Tips for Preventing BreachesKeep track of documents containing PHI (dont leave papers unattended, avoid taking documents into the cafeteria or restroom).

Keep private conversations private if PHI is being discussed (you never know who may overhear).

Never text PHI without using appropriate software.

Do not share PHI via social media.

Tips for Preventing BreachesObtain a patients permission before involving others in discussions that include PHI.

Do not access or use patient information that is not related to your student responsibilities.

Never disclose PHI to anyone that is not authorized to have the information.

Encrypt all electronic equipment that may contain PHI.

Patient Complaints Regarding Breaches of PHIPatients who have any concerns related to the privacy or security of their PHI may:contact the UConn Health Patient Relations Department.file a complaint with the U.S. Department of Health and Human Services, Office for Civil Rights.

Refer to UCHC Policy #2003-19: Patient Complaint Regarding Use and Disclosure of PHI

UConn Health PoliciesPlease review UConn Healths Confidentiality Policy at:http://www.policies.uchc.edu/policies/policy_2002_43.pdf

All HIPAA Privacy and Security policies are located at:

http://www.policies.uchc.edu/area/hipaa_privacy.html

http://www.policies.uchc.edu/area/hipaa_security.html

UConn Health ContactsFor Privacy questions or to report Privacy violations contact: Iris Mauriello, Privacy [email protected]

For Security questions or to report Security violations contact: Jon Carroll, Information Security [email protected]

You may also report any Privacy or Security concern anonymously through UConn Health REPORTLINE: 1-888-685-2637

Thank you for completing the HIPAA/HITECHPrivacy and Security training.

Please complete the training acknowledgment on the next slide.

Training AcknowledgmentI have completed this HIPAA/HITECH Privacy and Security training.

I agree to abide by UConn Healths Confidentiality and HIPAA Privacy and Security policies.

I have been informed where to obtain additional information on HIPAA Privacy and Security.

I acknowledge my obligation to report a HIPAA Privacy or Security concern.

Yes