HIPAA Health Insurance Portability and Accountability Act East Bridge Massage What is HIPAA? • Federal Law with Regulations on: • • • • Privacy & Security of health information Notification of breaches of confidentiality Penalties for violating HIPAA Establishes basic privacy and security protection of health information. • Guarantees individuals the right to access their health information and learn how it is used and disclosed • Simplifies payment for health care • Overseen by: Department of Health & Human Services (HHS) and enforced by Office for Civil Rights (OCR) What does HIPAA consist of? • Standardized Electronic Data Interchange transactions and codes for all covered entities. • Standards for security of data systems. • Privacy protections for individual health information. • Standard national identifiers for health care. Why was HIPAA created? • In 2000, many patients that were newly diagnosed with depression received free samples of anti-depressant medications in their mail. • This left patients wondering how the pharmaceutical companies were notified of their disease. • After a long and thorough investigation, the Physician, the Pharmaceutical company and a well-known pharmacy chain were all indicted on breach of confidentiality charges. • This is one of the many reasons the Federal Government needed to step in and create guidelines to protect patient privacy. Important HIPAA definitions • • • • • • Privacy - state of being concealed; secret Confidentiality – containing private information (Ex. Medical Record). Authorization – to give permission for; to grant power to. Breach Confidentiality – to break an agreement, to violate a promise. Disclosure – means the release, transfer, provision of access to, or divulging of information outside the entity holding the information. Use – means the sharing, employment, application, utilization, examination, or analysis of individually identifiable information within an entity. Important HIPAA terminology Protected Health Information • Protected Health Information [PHI] – is information that is created or received by a covered entity that: • Relates to the past, present, or future physical or mental health of an individual. • Identifies the individual or contains reasonable information that can be used to identify the individual(s). • Examples of Protected Health Information: • Name, address, telephone, fax, email, social security number, medical diagnoses, medical records, account numbers and photographs or images. Important HIPAA terminology; Covered Entities • Covered Entities [CE] – are the individuals responsible for implementing HIPAA rules and regulations. Some examples are: • Health Plans • Health Care Clearinghouses • Health Care Providers who conduct certain financial and administrative transactions electronically. Important HIPAA terminology Treatment, Payment and HC Operations • Treatment, Payment and Health Care Operations [TPO] – are common uses of Protected Health Information [PHI] for which HIPAA does not require an authorization. Important HIPAA Terminology; Notice of Privacy Practice • Notice of Privacy Practice [NPP]- a notice given to patients concerning the use and disclosure of their Protected Health Information [PHI] Who Carries out HIPAA rules and regulations? • Covered Entities are responsible for implementing HIPAA rules and regulations. • These are • Health Plans • Health Care Clearinghouses • Health Care providers What must a covered entity do to be in compliance with HIPAA? • Notify patients about their privacy rights and how their information can be used. • Adopt and implement privacy procedures. • Train employees so they understand the privacy procedures. • Designate a Privacy Officer. • Secure patient records containing Protected Health Information [PHI]. (Only use first name & initial; turn files and other paperwork over. Don’t talk about patient conditions etc) What are a patient’s rights under HIPAA? • Right to written Notice of Privacy Practices [NPP] that informs consumers how Protected Health Information [PHI] will be used and to whom it is disclosed • Right of timely access to see and copy records for a reasonable fee • Right to an amendment of records • Right to restrict access and use • Right to an accounting of disclosures • Right to revoke authorization What are the HIPAA rules and regulations that protect these rights? • Patient’s rights: • Patients have a right to confidentiality of all information that is provided to the healthcare professional and institution. • Health care professionals ensure that patient information is secured at all times and if there are any complaints, those complaints will be resolved in a timely manner. What are the HIPAA rules and regulations that protect these rights? Privacy Rule • The Privacy Rule: • • • • • Establishes a Federal floor of safeguards to protect the confidentiality of medical information. Allows patients to make informed choices when seeking care and reimbursement for care based on how personal health information may be used. This rule is used to protect Protected Health Information [PHI] This rule took effect on April 14, 2003. YOU MAY NOT RETALIATE AGAINST OR INTIMIDATE AN EMPLOYEE WHO FILES A HIPAA COMPLAINT. What are the HIPAA rules and regulations that protect these rights? Request for amendment • Request for Amendment is a patient’s right to request, in writing, to have health information or a record about the patient amended. • The Covered Entity does not have to agree to the amendment, however if the CE does agree, the request to amend will become a part of the patient's medical record. What are the HIPAA rules and regulations that protect these rights? Request for restrictions • Request for Restrictions is a patient’s right to request, in writing, a restriction or limitation on the health information that a Covered Entity uses or disclosures. • The Covered Entity is not required to agree to the restriction. What are the HIPAA rules and regulations that protect these rights? Accounting of disclosures • Accounting of Disclosures is the patient’s right to request a list of people and organizations who have received their Protected Health Information [PHI]. • Patients must submit a written Request for Accounting of Disclosures. • A Covered Entity [CE] must respond to a patient’s request for an accounting within 60 days of receipt of the request. • Some Examples of Disclosures are disclosures that are: • Required by law • For public health activities • About victims of abuse, neglect, or domestic violence • For judicial and administrative proceedings • For research activities • For law enforcement activities • For workers compensation What are the HIPAA rules and regulations that protect these rights? Authorizations • An Authorization is a detailed document that gives covered entities permission to use Protected Health Information [PHI] for specified purposes. • • • • It is required for the use and disclosure of Protected Health Information [PHI] not otherwise allowed by the Privacy Rule. Does not apply to Treatment, Payment and Health Care Operations [TPO]. Does not apply to uses and disclosures required by law. AN AUTHORIZATION MAY BE REVOKED AT ANY TIME IN WRITING. What are the requirements of an Authorization? • An Authorization must include: • The Protected Health Information [PHI] to be used and disclosed; • The person authorized to make the use or disclosure; • The person to whom the Covered Entity may make the disclosure; • An expiration date; and • The purpose for which the information may be used or disclosed. What are the HIPAA rules and regulations that protect these rights? Minimum necessary standard • • HIPAA requires Covered Entities to take reasonable steps to disclose only the information that is necessary for the purpose for which the disclosure is to be made [the minimum necessary amount of information needed to perform the job]. The Minimum Necessary DOES NOT APPLY TO: • • • • Treatment Disclosures to the individual who is the subject of the Protected Health Information [PHI] Uses or disclosures made pursuant to an individual’s authorization Uses or disclosures that are required by law. What are the HIPAA rules and regulations that protect these rights? Research activities • NO ONE is permitted to use Protected Health Information for research without complying with the new HIPAA requirements. • These HIPAA requirements are entirely separate from the existing federal human subject research regulations. • The Privacy Policies and Procedures do not replace or override other rules or procedures established by the Institutional Review Board [IRB], both must be complied with in order to conduct human research. Don’ts How do I protect my patient’s privacy? Do’s and don'ts Do: • Tell anyone what you overhear about a patient. • Close doors in patient’s rooms when discussing treatments. • Log off the computer when you are finished. • Dispose of patient information by shredding or storing it in a locked container for destruction. • Clear patient information off of your desk when your leave your desk. • Discuss a patient in public areas, such as front lobby, hallways or breakrooms. • Look at information about a patient unless you need it to do your job. Do’s Don’t: Computer Use •Keep your password a secret Sending •Do not log in using someone else’s password •Use cover sheets for faxes •Log off of the computer when you are finished using it. •Turn the computer screen away from public view •Do not remove equipment, disks, or software without permission. •Call the intended recipient before sending the fax •DO NOT SEND [HIV results, Mental Abuse, Narcotic Prescriptions, Alcohol/Substance/Child Abuse Receiving •Tell the person faxing information to alert you when he/she is about to send the fax •Take faxes off the machine immediately •Do not let faxed patient information lie around unattended Safe Fax Use Safe computer Use How do I protect my patient’s privacy? Safe Computer and fax use How do I protect my patient’s privacy? Safeguards • Physical Safeguards • Computer terminals are private. Patient files turned • • over. Do not use patient full name when discussing. Technical Safeguards • Password protect phones and computers. Administrative Safeguards • Policy and procedure for release of patient information. Who else is responsible for protecting patient privacy? Business associates • Business Associate • A person or entity that performs a function or activity on behalf of a Covered Entity [CE] that requires the creation, use or disclosure of Protected Health Information [PHI] but who is not considered part of the Covered Entities' workforce. They must have a written contract or agreement that assures they will appropriately safeguard Protected Health Information [PHI] they create or receive. Examples of Business Associates A health care clearinghouse that translates a claim from a nonstandard format into a standard transaction on behalf of a health care provider and forwards the processed transaction to a payer. A CPA firm An whose A third-party independent accounting administrator medical who assists a transcriptioni services to a health care health plan st who provider with claims provides involve access processing. transcription to protected services to a health physician. information. A pharmacy benefits manager who manages a health plan’s pharmacist network. What are some ways HIPAA can be violated? Incidental disclosure • A secondary use or disclosure that cannot reasonably be prevented, is limited in nature, and occurs as a by-product of an otherwise permitted use or disclosure. • Examples of Incidental Disclosure • A hospital visitor may overhear a provider’s • confidential conversation with another provider or a patient A hospital visitor may glimpse a patient’s information on a sign-in sheet or nursing station whiteboard What are some ways HIPAA can be violated? Breach • A breach is, generally, an impermissible use or disclosure under the Privacy Rule that compromises the security or privacy of the protected health information. What is done after patient privacy has been compromised? HITECH act • What is the HITECH act? • As a result of the American Recovery and Reinvestment Act of 2009, legislation passed the Health Information Technology for Economic and Clinical Health Care Act which places additional privacy and security requirements. • This requires any entity that handles Protected Health Information [PHI] to report breaches, whether in paper or electronic form within timeframe that HITECH requires. • HITECH applies to all business entities associated with healthcare organizations such as banks, claims, clearing houses, billing firms, health information exchanges and software companies. What are the breach notification requirements? • Notification is required to the affected individuals, the government and in certain cases the media [if the breach involves more than 500 people] in the event of a breach of “Unsecured Protected Health Information”. • These breach requirements are applicable to both Covered Entities [CE] and their Business Associates. • If the Covered Entities Business Associate has a breach, they must report it within 60 days. • The snail mail requirement states that the healthcare organization must send out a first-class letter to any patients that might have been affected by the breach. [Electronic mail is allowed given the patient agreed to receive electronic notices] What are the consequences of not complying with Hi-Tech? • There are serious penalties for non-compliance, ranging from fines of $100 to $50,000 per violation, capped at $25,000 to $1.5 million per violation of the same standard. • Criminal penalties of 1 to 10 years in jail for gross negligence. • HITECH also created new methods for enforcement, allowing state attorney generals to enforce HIPAA regulations. What are the consequences of not complying with HIPAA? Penalties for privacy violations • Civil Penalties under HIPAA: • Maximum fine of $25,000 per violation. • Criminal Penalties under HIPAA: • Maximum of 10 years in jail and/or a $250,000 fine for serious offenses. • Organization Actions: • Employee disciplinary actions including suspension or termination for violations of the organizations policies and procedures. Who enforces medical privacy regulations? • Office for Civil Rights • • A patient may complain to the Privacy Officer The Director of Health and Human Services [HHS] Thank you for viewing. Wendi Sharp, Clinic Manager East Bridge Massage