Document

advertisement
An Overview of HIPAA
Presented by the Office of the General Counsel
HIPAA
•
•
•
•
•
Health
Insurance
Portability and
Accountability
Act
HIPAA’s Goals
• Simplify the Administration of
Electronic Health Information
• Protect an Individual’s Privacy
Rights with regard to Health
Information
When is HIPAA effective?
• First Deadline: October 2002
– Possible Extension until Oct. 2003
– AU must have Compliance plan
• Privacy Regulations: April 2003
– AU target date for compliance
Who Must Comply?
“ Each Covered Entity who
maintains or transmits
health information”
•
•
Health Plans
Health Care Clearinghouse
•
Health Care Providers
Who is a Provider?
“Any person or entity that
furnishes, bills, or is paid for
health care in the normal course
of business.”
– Health Care = any “care, services, or
supplies related to the health of an
individual”
Examples of
Providers / Plans
• Student Health
Center
• Psychology
Clinics
• EAP
• Athletic
Department
• Hearing / Eye
Clinics
• Self – Insurance
Health Plans
4 Key HIPAA Elements
• Electronic Transaction & Code
Set Standards
• Security Standards
• Privacy Regulations
• National Identifiers
Electronic Transaction &
Code Set Standards
• General Rule:
“If a covered entity (either itself or
through an agent) conducts a
Covered Transaction electronically,
the transaction must be conducted
using the HIPAA form.”
Electronic Transaction &
Code Set Standards
Required Elements
1. Covered Entity
2. Electronically transmits
3. Covered Transaction
Covered Transactions
•
•
•
Submission of
Claims for
payment
Checking
eligibility
Enrollment &
Disenrollment
• Referrals and precertification
• Claims
attachments
• Payment & claims
remittance
• Coordination of
Benefits
• Checking claims’
status
Electronic Transaction &
Code Set Standards
Requirements of ETS
•
•
•
Standard Formats
Standard Data Content
Standard Codes
Electronic Transaction &
Code Set Standards
Where to find the ETS standards:
•
http://aspe.hhs.gov/admnsimp
•
www.wpc-edi.com/HIPAA
•
www.afehct.org
Security Standards
• Intended to protect against
• Unauthorized access
• Accidental / Intentional
disclosure to unauthorized
persons
• Alteration, destruction, or loss
Security Standards
Who is Covered?
• Any covered entity
• That Stores information
electronically
• Does not have to be a
covered transaction
Security Standards
- Elements • Administrative Procedures
– Protects health info
– Manages personnel Conduct
• Physical Safeguards
– Protects physical systems / buildings
• Technical Security
– Controls access to health information
Administrative Procedures
•
•
•
•
•
•
•
Security Analysis
Information access privileges
Password & Authentication policies
Plans for disasters & security breaches
Disciplinary process & penalties
Employee & Vendor Training
Security Officer
Physical Safeguards
• Document ways computer &
physical records are protected
• Use of keys, locks, etc. to
control access to computers
• Restriction of access to
authorized persons
• Tracking of medical records
• Workstation location policy
Technical Security
• Single sign-on technology
• New user ID’s, passwords
• Audit trails for health info
Security Standards
General Comments
• Still in proposed form
• Not technically specific
• Amount of security required
is scalable based on dept.
size and resources
Privacy Regulations
• General Rule:
“A covered entity may not use
or disclose Protected Health
Information (PHI) except as
permitted by the privacy
regulations.”
Privacy Regulations
• PHI – Protected Health Information
– Individually Identifiable
– Any form or medium
• Electronic, Oral, or Written
– Created or Received
– Relates to past, present, future condition
or payment of individual
– Exception: FERPA records
Privacy Regulations
• General Requirement:
“Must make reasonable efforts to
limit the use and disclosure of
PHI to the minimum necessary to
accomplish intended purpose.”
Privacy Regulations
Main Elements
• Rules for Use & Disclosure of PHI
• Patient’s Rights to Health Info
• Administrative Procedures
• Business Partner Requirement
Rules for Use & Disclosure
Consent vs. Authorization
Consent: If a general written consent is
obtained, a provider may use/disclose
PHI for “TPO”
Authorization: If use/disclosure is not
for “TPO”, use/disclosure forbidden
without a more specific authorization
“TPO” = Treatment/Payment/Health
Care Operations
Rules for Use & Disclosure
“TPO” = Treatment / Payment /
Health Care Operations
Treatment: Provision, coordination,
management of healthcare
Payment: Actions to obtain payment
Operations: Internal day-to-day business
Ex: QA, Peer Review, Customer Service
Rules for Use & Disclosure
Consent
• Must be in plain language
• Must specify use of PHI
• Can make a prerequisite to
treatment (Can refuse treatment)
• Exceptions: Emergency, Required
by Law, Communication barriers,
Rules for Use & Disclosure
•
•
•
•
Authorization
Cannot be a condition of treatment
Must Inform about specific use and
right to refuse, revoke, and inspect
Psychotherapy Notes require
Authorization
Examples
• Research
• Marketing
• Fundraising
Patient’s Rights
• Right to Notice of Privacy
Practices
• Right of Access to PHI
• Right to Accounting of
Disclosures for 6 years
• Right to request restriction of
TPO use to family members
– Not required to agree if TPO
Administrative Procedures
• Document policies, procedures, &
systems to achieve compliance
• Complaint Mechanisms
• Employee Sanctions
• Documented training of employees
• Mitigation of harmful effects
• Designated Privacy officer
Business Associates
• General Rule:
– A covered entity must have a
business associate contract to
ensure that its business associates
also are in compliance with HIPAA’s
protection of PHI.
Business Associates
• Business Associates…
– Perform a function involving use /
disclosure of PHI on behalf of the
covered entity
– Perform legal, accounting,
consulting, data aggregation,
administrative, management, or
financial services involving PHI for
the covered entity
Business Associates
• Examples:
–
–
–
–
–
Billing companies
Computer Vendors
Attorneys, Accountants, Auditors
Consultants
Document storage / destruction
companies
Business Associates
• Business Associate Contracts:
– Restrict use & disclosure of PHI
– Require appropriate safeguards
– Require similar requirements of
subcontractors
– Require B.A. to disclose breaches
– Require B.A. to remedy breaches or
risk termination of contract
Hybrid Entity
• Requirements
– Single Legal Entity
– Primary business is not healthcare
• Advantages
– Only “Healthcare Components”
must comply with HIPAA
• Disadvantage
– Firewall between HC Components
and Non-Components
Hybrid Entity
• Auburn must…
– Identify Healthcare Components
– Identify Business Associates of the
HC Components
– Erect the ‘firewalls’ between HC
Components & Non-Components
Penalties for Non-Compliance
** Both Individuals & Entities can
incur criminal and/or civil penalties
Civil Penalties: $100 - $25,000
Criminal Penalties: Max 10 yrs. Prison
Max $250,000 fine
HIPAA Timeline
• ETS Standards: October 16, 2002
– Extended to Oct. 2003 w/
University extension
• Privacy Regs: April 14, 2003
• Security Regs: Date expected by
August 2002
Next Steps toward Compliance
1. Fill out the AU HIPAA Survey
2. Review how PHI is stored,
accessed, protected, & destroyed
3. Think about easy steps to better
protect PHI
4. Designate 1+ person to review
specific HIPAA policies
For more HIPAA info…
• www.hipaa.org
– Links to complete final rules &
proposed rules
• www.hipaadvisory.com
– News, primers, and complete rules
• www.hrm.uab.edu/HIPAA
– UAB’s training site
Additional Questions?
Contact the Provost’s Office
Download