44
UNIVERSITY OF ALABAMA HIPAA Privacy and Security Training For Employees Compliance is Everyone’s Job 1 INTERNAL USE ONLY

HIPAA Training - 2011

Embed Size (px)

DESCRIPTION

HIPAA Employee Security and Privacy Training for 2011

Citation preview

Page 1: HIPAA Training - 2011

UNIVERSITY OF ALABAMA

HIPAA Privacy and Security Training For Employees

Compliance is Everyone’s Job

1INTERNAL USE ONLY

Page 2: HIPAA Training - 2011

INTERNAL USE ONLY 2

Topics to Cover

• General HIPAA Privacy and Security Overview

• HIPAA Privacy

• ARRA of 2009: HIPAA Breach Notification Rules and Procedures

• HIPAA Security

• Questions/Acknowledgment of Training

Page 3: HIPAA Training - 2011

INTERNAL USE ONLY 3

What is HIPAA?

The Health Insurance Portability and Accountability Act (HIPAA) addresses issues ranging from health insurance coverage to national standard identifiers for healthcare providers

The portions that are important for our purposes are those that deal with protecting the privacy and security of health data, which HIPAA calls Protected Health Information or PHI

Page 4: HIPAA Training - 2011

INTERNAL USE ONLY 4

Applicability of HIPAA to UA• HIPAA Applies to:

• University Medical Center • Brewer-Porch Children's Center • The Speech & Hearing Center • Autism Clinic• Departments that have signed Business Associate Agreements• Group Health Insurance/Flexible Spending Plan/EAP• UA Administrative Departments supporting the above entities (like

Legal Office, Auditing, Financial Affairs, Risk Management, OIT, UA Privacy/Security Officer, etc.)

• Research involving PHI from a HIPAA covered entity• Does not apply to Psychology Clinic, Student Health

Center/Pharmacy, ODS records, Counseling Center, WRC, Athletic Dept health records

Page 5: HIPAA Training - 2011

INTERNAL USE ONLY 5

What is Protected Health Information (PHI)

• Any information, transmitted or maintained in any medium, including demographic information;

• Created/received by covered entity or business associate;

• Relates to/describes past, present or future physical or mental health or condition; or past, present or future payment for provision of healthcare; and

• Can be used to identify the patient

Page 6: HIPAA Training - 2011

INTERNAL USE ONLY 6

Types of Data Protected by HIPAA

• Written documentation and all paper records• Spoken and verbal information including voice mail

messages• Electronic databases and any electronic information,

including research information, containing PHI stored on a computer, smart phone, memory card, USB drive, or other electronic device

• Photographic images• Audio and Video

Page 7: HIPAA Training - 2011

INTERNAL USE ONLY 7

To De-Identify Patient Information You Must Remove All 18 Identifiers:

• Names• Geographic subdivisions smaller than state (address, city,

county, zip)• All elements of DATES (except year) including DOB, admission,

discharge, death, ages over 89, dates indicative of age• Telephone, fax, SSN#s, VIN, license plate #s• Med record #, account #, health plan beneficiary #• Certificate/license #s• Email address, IP address, URLs• Biometric identifiers, including finger & voice prints• Device identifiers and serial numbers • Full face photographic and comparable images• Any other unique identifying #, characteristic, or code

Page 8: HIPAA Training - 2011

INTERNAL USE ONLY 8

Department of Justice-Imposed Criminal Penalties for Employee

• Wrongfully Accessing or Disclosing PHI: Fines up to $50,000 and up to 1 Year in Prison

• Obtaining PHI Under False Pretenses: Fines up to $100,000 and up to 5 Years in Prison

• Wrongfully Using PHI for a Commercial Activity: Fines up to $250,000 and up to 10 Years in Prison

• HIPAA criminal and civil fines and penalties can be enforced against INDIVIDUALS as well as covered entities who obtain or disclose PHI without authorization. Now applies to Business Associates

Page 9: HIPAA Training - 2011

INTERNAL USE ONLY 9

Federal-Imposed Civil Penalties• Tier A: Did not realize violated and would have handled differently:

– Minimum per violation: $100 (each name in a data set can be a violation); Maximum per calendar year: $25,000

• Tier B: Violations due to reasonable cause, but not willful neglect: – Minimum per violation: $1,000; Maximum per calendar year: $50,000

• Tier C: Violations due to willful neglect that organization corrected: – Minimum per violation: $10,000; Maximum per calendar year: $250,000

• Tier D: Violations due to willful neglect that organization did not correct– Minimum per violation: $50,000; Maximum per calendar year: $1.5 Million

• HHS is now required to investigate and impose civil penalties where violations are due to willful neglect

• Feds have 6 yrs from occurrence to initiate civil penalty action• State attorneys general can pursue civil cases against INDIVIDUALS

who violate the HIPAA privacy and security regulations• Civil Penalties now apply to Business Associates

Page 10: HIPAA Training - 2011

INTERNAL USE ONLY 10

Top 10 Incidents – out of 278(as of 5/23/2011)

Name of Covered Entity State Business Associate Involved Individuals Affected

Date of Breach Type of Breach

Location of Breached

Information

Health Net, Inc. CA IBM 1900000 1/21/2011 Unknown Other

New York City Health & Hospitals Corporation's North Bronx Healthcare

Network NY GRM Information Management Systems 1700000 12/23/2010 TheftElectronic Medical

Record, Other

AvMed, Inc. FL 1220000 12/10/2009 Theft Laptop

Blue Cross Blue Shield of Tennessee TN 1023209 10/2/2009 Theft Hard Drives

South Shore Hospital MAIron Mountain Data Products, Inc. (now known as Archive Data Solutions, LLC) 800000 2/26/2010 Loss

Portable Electronic Device, Electronic

Medical Record, Other

Eisenhower Medical Center CA 514330 3/11/2011 Theft Desktop Computer

Puerto Rico Department of Health PRTriple-S Management, Corp.; Triple-S

Salud, Inc. 400000 9/21/2010

Unauthorized Access/Disclosure, Hacking/IT Incident Network Server

Triple-S Salud, Inc. PR Triple-C, Inc. 398000 9/9/2010 Theft Network Server

Affinity Health Plan, Inc. NY 344579 11/24/2009 Other Other

Seacoast Radiology, PA NH 231400 11/12/2010 Hacking/IT Incident Network Server

Page 11: HIPAA Training - 2011

INTERNAL USE ONLY 11

UA HIPAA Sanctions• Employees who do not follow Privacy and Security

Policies and related workplace rules and policies are subject to disciplinary action, up to and including dismissal

• Type of sanction depends on severity of violation, intent, pattern/practice of improper activity, etc.

Page 12: HIPAA Training - 2011

INTERNAL USE ONLY 12

HIPAA Permitted Uses and Disclosures of PHI

• A covered entity can always use and disclose PHI for any purpose if it gets the person’s signed HIPAA-valid authorization

• Only designated, HIPAA trained personnel are permitted to approve disclosure of PHI per the person’s HIPAA-valid authorization

• For a complete list of permitted uses and disclosures of PHI, see your entity’s notice of health information practices

Page 13: HIPAA Training - 2011

INTERNAL USE ONLY 13

HIPAA Permitted Uses and Disclosures of PHI• The HIPAA Privacy Rule states that PHI may be used and

disclosed to facilitate treatment, payment, and healthcare operations (TPO) which means:– PHI may be disclosed to other providers for treatment– PHI may be disclosed to other covered entities for payment– PHI may be disclosed to other covered entities that have a

relationship with the patient for certain healthcare operations such as quality improvement, credentialing, and compliance

– PHI may be disclosed to individuals involved in a patient’s care or payment for care unless the patient objects

Page 14: HIPAA Training - 2011

INTERNAL USE ONLY 14

Minimum Necessary Standard• When HIPAA permits use or disclosure of PHI, a covered

entity must use or disclose only the minimum necessary PHI required to accomplish the purpose of the use or disclosure

• The only exceptions to the minimum necessary standard are those times when a covered entity is disclosing PHI for the following reasons:– Treatment– Purposes for which an authorization is signed– Disclosures required by law– Sharing information to the patient about himself/herself

Page 15: HIPAA Training - 2011

INTERNAL USE ONLY 15

What HIPAA Did Not Change:

• Family and friends can still pick up prescriptions for sick people

• Physicians and Nurses do not have to whisper• State laws still govern the disclosure of minor’s

health information to parents. (a minor is under the age of 19 in Alabama)

Page 16: HIPAA Training - 2011

INTERNAL USE ONLY 16

Other Privacy Safeguards• Avoid conversations involving PHI in public or common areas

such as hallways or elevators• Keep documents containing PHI in locked cabinets or locked

rooms when not in use• During work hours, place written materials in secure areas that

are not in view or easily accessed by unauthorized persons• Do not leave materials containing PHI on desks or counters, in

conference rooms, or in public areas• Do not remove PHI in any form from the designated work site

unless authorized to do so by management• Never take photographs in patient care areas

Page 17: HIPAA Training - 2011

INTERNAL USE ONLY 17

Required Forms and Documents Used at UA• Notice of Health Information Practices• Acknowledgement of Receipt of Notice• Confidentiality Statement• Authorization for Use or Disclosure of Information• Accounting of Disclosures Documentation• Business Associate Agreements• Fax Coversheet• Data Use Agreement

Page 18: HIPAA Training - 2011

INTERNAL USE ONLY 18

Business Associate Agreements

• Are required before a covered entity can contract with a third party individual or vendor (subcontractor) to perform activities or functions which will involve the use or disclosure of the covered entity’s PHI

• Binds the third party individual or vendor to the HIPAA regulations when performing the contracted services.

• Must be approved in accordance with appropriate UA policies and procedures

Individual employees are NOT authorized to sign contracts on behalf of UA

Page 19: HIPAA Training - 2011

INTERNAL USE ONLY 19

HIPAA Put New Requirements on Research:

• If you work for a Health Care Provider under HIPAA, do not release PHI for research unless:– The patient has signed a valid HIPAA authorization, or– The IRB at UA has approved a waiver of authorization; or – The IRB agrees that an exception applies.

Information regarding HIPAA and Research is available through Office of Research Compliance – Director is Tanta Myles

Page 20: HIPAA Training - 2011

20

American Recovery and Reinvestment Act of 2009 (ARRA)

• Expanded privacy and security provisions of the Health Insurance Portability and Accountability Act of 1996 (HIPAA)

• One new requirement is that we must notify affected individuals and federal officials when a breach or potential breach of privacy has occurred

• The next 12 slides discuss our obligation under these rules

INTERNAL USE ONLY

Page 21: HIPAA Training - 2011

21

First Federal Definition of Breach • ARRA provides the first federal definition of a Breach:

– The unauthorized acquisition, access, use, or disclosure of unsecured PHI which compromises the security or privacy of the information

– Exceptions:• Unintentional acquisition, access, or use of PHI by an employee or

individual acting under the authority of a covered entity• Inadvertent disclosure of PHI from one person authorized to

access PHI at a covered entity to another person authorized to access PHI at the covered entity

• Unauthorized disclosures in which an unauthorized person to whom PHI is disclosed would not reasonably have been able to retain the information

INTERNAL USE ONLY

Page 22: HIPAA Training - 2011

22

Secured PHI

• ARRA further identified the information to which the breach notification provisions apply. It defined “unsecured protected health information” as PHI that is not secured through the use of a technology or methodology that renders it unusable, unreadable, or indecipherable and that is developed or endorsed by the American National Standards Institute

• Therefore, for breaches involving the misuse, loss, or inappropriate disclosure of paper or electronic data, there are some “home free” methods under which the loss would indicate no harm done: – Paper-secured by use of crosscut shredder (or destroyed)– Electronic data-encrypted data files and/or transmissions

INTERNAL USE ONLY

Page 23: HIPAA Training - 2011

INTERNAL USE ONLY 23

Encryption• Security Rules require Covered Entity/Business

Associate to consider implementing encryption as a method for safeguarding Electronic Protected Health Information (EPHI)

• If you choose to encrypt, then not required to notify in event of breach

Page 24: HIPAA Training - 2011

24

What Constitutes a Breach?

• A breach could result from many activities. Some examples are– Failing to log off when leaving a workstation– Unauthorized access to PHI– Sharing confidential information, including passwords– Having patient-related conversations in public settings– Improper disposal of confidential materials in any form– Copying or removing PHI/ePHI from the appropriate area

• Why?– Curiosity…about a co-worker or friend– Laziness…so shared sign-on to information systems– Compassion…the desire to help someone– Greed or malicious intent…for personal gain

INTERNAL USE ONLY

Page 25: HIPAA Training - 2011

25

Example 1

• Bill, a billing employee, receives and opens an email containing PHI which a nurse, Nancy, mistakenly sent to Bill. Bill notices that he is not the intended recipient, alerts Nancy to the misdirected email, and deletes it.

• Was this a breach of PHI?

INTERNAL USE ONLY

Page 26: HIPAA Training - 2011

26

And the answer is…

• No. Bill unintentionally accessed PHI that he was not authorized to access. However, he opened the email within the scope of his job for the covered entity. He did not further use or disclose the PHI.

• This was not a breach of PHI as long as Bill did not further use or disclose the information accessed in a manner not permitted by the Privacy Rule

INTERNAL USE ONLY

Page 27: HIPAA Training - 2011

27

Example 2

• Rhonda is a receptionist for a covered entity, and, due to her work responsibilities, she is not authorized to access PHI. Rhonda decides to look through patient files to learn about a friend’s last visit to the doctor.

• Does Rhonda’s action constitute a breach?

INTERNAL USE ONLY

Page 28: HIPAA Training - 2011

28

The answer is…

• Yes. Rhonda accessed PHI without a work-related need to know. This access was not unintentional, done in good faith, or within the scope of her job for the covered entity.

INTERNAL USE ONLY

Page 29: HIPAA Training - 2011

29

One more example…

• Rob, a research assistant, wanted to get ahead on some statistical work, so he copied the information from 240 research participants to his thumb drive. The information included PHI, and the thumb drive was not encrypted. On his way home to continue his work, he stopped by the store to get some snacks. When he returned to his car, he found it had been broken into. Missing were his GPS, dozens of CDs, and his book bag containing the thumb drive.

• Does this event constitute a breach?

INTERNAL USE ONLY

Page 30: HIPAA Training - 2011

30

The answer is…

• Yes. Unsecured PHI was stolen because the thumb drive was unencrypted.

• Actually, Rob violated many UA policies:– Removed confidential information from the unit without

approval– Used his personal portable computing device for UA

business without senior management approval– Copied confidential information to a portable computing

device without senior management approval– Used a portable computing device that was not encrypted

INTERNAL USE ONLY

Page 31: HIPAA Training - 2011

31

Breach Notification Regulations

• If it is determined that a breach of PHI occurred, then the covered entity must notify the affected individual (or next of kin) without unreasonable delay, but not later than 60 calendar days from discovering the breach– Time runs when incident first known or reasonably should have been

known (true for Covered Entity and Business Associate)• If more than 500 individuals are affected additional requirements

include• Immediate notification of the Department of Health and Human

Services to post on their website• Notify major media outlets in covered entity area• Post on covered entity website home page for 90 days

INTERNAL USE ONLY

Page 32: HIPAA Training - 2011

32

Responsibility to Report

• When receiving a privacy complaint, learning of a suspected breach in privacy or security, or noticing something is “just not right,” we must work together • Immediately; cooperatively; efficiently; carefully; and

confidentially • If you notice, hear, see, or witness any activity that you

think might be a breach of privacy or security, please let your organization’s privacy and/or security officer know immediately

• It is much better to investigate and discover no breach than to wait and later discover that something DID happen

INTERNAL USE ONLY

Page 33: HIPAA Training - 2011

INTERNAL USE ONLY 33

Security Standards – General Rules

• HIPAA security standards ensure the confidentiality, integrity, and availability of PHI created, received, maintained, or transmitted electronically (ePHI – Electronic Protected Health Information) by and with all facilities

• Protect against any reasonably anticipated threats or hazards to the security or integrity or such information

• Protect against any reasonably anticipated uses or disclosures of such information that are not permitted

Page 34: HIPAA Training - 2011

INTERNAL USE ONLY 34

Rules for Access

• Access to computer systems and information is based on your work duties and responsibilities

• Access privileges are limited to only the minimum necessary information you need to do your work

• Access to an information system does not automatically mean that you are authorized to view or use all the data in that system

• Different levels of access for personnel to ePHI is intentional• If job duties change, clearance levels for access to ePHI is re-

evaluated• Access is eliminated if employee is terminated• Accessing ePHI for which you are not cleared or for which there is

no job-related purpose will subject you to sanctions

Page 35: HIPAA Training - 2011

INTERNAL USE ONLY 35

Rules for Protecting Information• Do not allow unauthorized persons into restricted areas where

access to PHI or ePHI could occur• Arrange computer screens so they are not visible to unauthorized

persons and/or patients; use security screens in areas accessible to public

• Log in with password, log off prior to leaving work area, and do not leave computer unattended

• Close files not in use/turn over paperwork containing PHI • Do not duplicate, transmit, or store PHI without appropriate

authorization• Storage of PHI on unencrypted removable devices

(Disk/CD/DVD/Thumb Drives) is prohibited without prior authorization

Page 36: HIPAA Training - 2011

INTERNAL USE ONLY 36

Encryption of ePHI• Encryption is generally necessary to protect information

outside of the Electronic Medical Records (EMR) system• Use of other mobile media for accessing and transporting

ePHI such as smart phones, iPads, Netbooks, thumb drives, CDs, DVDs, etc., presents a very high risk of exposure and requires

• Use of any personally owned laptops, desktops or other mobile devices (non-UA equipment) for accessing ePHI requires appropriate authorization

Page 37: HIPAA Training - 2011

INTERNAL USE ONLY 37

Password Management• Do not allow coworkers to use your computer without first logging off your user

account• Do not share passwords or reuse expired passwords• Use passwords that cannot be easily guessed (B’day, pets, kids)• Choose new passwords when they must be reset• Do not write down passwords that could provide access to ePHI• Change password if you suspect anyone else knows it• Change passwords or delete accounts when employees are transferred or

terminated• Pick good passwords – Recommendations for good passwords:

– 8 characters long– 3 of 4 data types – Upper, Lower, Numeric and Special Character– Change periodically – Good password scheme is critical for complex passwords – R0llt!de (don’t use this,

just an example)

Page 38: HIPAA Training - 2011

INTERNAL USE ONLY 38

Protection from Malicious Software• Malicious software can be thought of as any virus, worm, malware, adware, etc. • As a result of an unauthorized infiltration, ePHI and other data can be damaged or

destroyed• Notify your supervisor, system support representative, and/or security officer

immediately if you believe your computer has been compromised or infected with a virus—do not continue using computer until resolved

• The University provides standard, managed anti virus and other security software• Do not disable anti-virus or other security software on individual workstations• Any personal devices used for access to ePHI must have appropriate anti virus

software • Do not open e-mail or attachments from an unknown, suspicious, or

untrustworthy source or if the subject line is questionable or unexpected—DELETE THEM IMMEDIATELY

Page 39: HIPAA Training - 2011

INTERNAL USE ONLY 39

Use of Technology• Use of other mobile media for accessing and transporting ePHI such as

smart phones, iPads, Netbooks, thumb drives, CDs, DVDs, etc., presents a very high risk of exposure and requires appropriate authorization

• Email, internet use, fax and telephones are to be used for UA business purposes (see UA policies)

• Fax of PHI should only be done when the recipient can be reliably identified; Verify fax number and recipient before transmitting

• No ePHI is permitted to leave facility in any format without prior approval • Where technically feasible, email should be avoided when communicating

unencrypted sensitive PHI - follow your organization’s email policy for ePHI• No ePHI is permitted on any social networking sites (Twitter, Facebook,

MySpace, etc.)• No ePHI is permitted on any texting or chat platforms (AOL, MSN, cell

phones)

Page 40: HIPAA Training - 2011

INTERNAL USE ONLY 40

Rules for Disposal of Computer Equipment• Only authorized employees should dispose of PHI in accordance with retention policies• Documents containing PHI or other sensitive information must be shredded when no

longer needed. Shred immediately or place in securely locked boxes or rooms to await shredding.

• All questions concerning media reallocation and disposal should be directed to your HIPAA Security Officer; OIT systems representatives are responsible for sanitization and destruction methods

• Media, such as CDs, disks, or thumb drives, containing PHI/sensitive information must be cleaned or sanitized before reallocating or destroying.

• “Sanitize” means to eliminate confidential or sensitive information from computer/electronic media by either overwriting the data or magnetically erasing data from the media

• If media are to be destroyed, then once they are sanitized, place them in specially marked secure containers for destruction

• NOTE: Deleting a file does not actually remove the data from the media. Formatting does not constitute sanitizing the media

Page 41: HIPAA Training - 2011

INTERNAL USE ONLY 41

Facility Access Controls

• Help to monitor the controls we have for Facility Access– Sign-in Visitors and Vendors (as required)– Insure that locks, card access, or any other physical access controls are

working as expected

• Report any problems or possible problems to your security officer

Page 42: HIPAA Training - 2011

INTERNAL USE ONLY 42

Reporting Security Incidents

• Notify your Security Officer of any unusual or suspicious incident

• Security incidents include the following:– Theft of or damage to equipment– Unauthorized use of a password– Unauthorized use of a system– Violations of standards or policy– Computer hacking attempts– Malicious software – Security Weaknesses– Breaches to patient, employee, or student privacy

Page 43: HIPAA Training - 2011

INTERNAL USE ONLY 43

Contacts and References

• Know Your Security and Privacy Officer:– Medical Center Privacy/Security Officer is Jan Chaisson– Brewer Porch Privacy/Security Officer is Warren Johnson– Speech and Hearing Privacy/Security Officer is Becca Brooks– Autism Clinic Privacy/Security Officer is Kim Camp– UA Group Health Plan/FSA Privacy/Security Officer is Dave Bertanzetti– Youth Services Institute Privacy/Security Officer is Karan Singley– UA Privacy Officer: Jan Chaisson– UA Security Officer: Ashley Ewing

• Other References– Privacy:

• www.hhs.gov/ocr/hipaa– Security:

• www.cms.hhs.gov/SecurityStandard

Page 44: HIPAA Training - 2011

INTERNAL USE ONLY 44

Training Certification• Please Complete the Training Acknowledgement Form to Obtain Credit for

Completing the Annual Training