HIPAA

Download as pdf or txt
Download as pdf or txt
You are on page 1of 25
At a glance
Powered by AI
The key takeaways are that HIPAA aims to protect patient privacy and the confidentiality of health information while standardizing healthcare administration. It establishes rules around use of protected health information and patient rights.

The main goals of HIPAA are to make it easier for people to keep health insurance, protect the confidentiality and security of healthcare information, and help control administrative costs in the healthcare industry.

The 5 main rules established under HIPAA are the Privacy Rule, the Transactions & Code Sets Rules, the Security Rule, the Unique Identifiers Rule, and the Enforcement Rule.

HIPAA, Privacy & Security Training Manual

Training Team , MedSpecialized Inc.


2018 Edition
HIPAA
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT

Objectives
● Understand what HIPAA is and its goal
● Identify what information are protected by HIPAA
● Understand how HIPAA affects the company and our jobs
● Identify the steps needed to ensure compliance with HIPAA
● Know what to do when we suspect any security breaches

What is HIPAA

H​ealth ​I​nsurance ​Po


​ rtability and ​A​ccountability ​A​ct

HIPAA​ ​is the federal Health Insurance Portability and Accountability Act of 1996. The
primary goal of the law is to make it easier for people to keep health insurance, protect
the confidentiality and security of healthcare information and help the healthcare
industry control administrative costs.

1996 ​ - Enacted by the ​United States Congress​ and signed by President ​Bill Clinton​.
2009 - Expanded and strengthened by the HITECH Act (Health Information
Technology for Economic and Clinical Health).
2013 - Department of Health and Human Services issued the “Final Rule”
that implements HITECH’s statutory amendments to HIPAA on January of
2013.
HIPAA TITLE I
Health Care Access, Portability, and Renewability

This is designed to protect the health insurance


coverage for workers and their families when they
change or lose their jobs. This provision also prohibits
group health plans from creating eligibility rules or
assessing premiums for individuals in the plan based
on health status, medical history, genetic information,
or disability. Aside from that, it also forbids individual
health plans from denying coverage or imposing pre
existing condition exclusions on individuals who have
at least 18 months of creditable coverage without
significant breaks.

HIPAA TITLE II
Preventing Health Care Fraud and Abuse; Administrative
Simplification; Medical Liability Reform

5 Rules:

The Privacy Rule


The Transactions & Code Sets Rules
The Security Rule
The Unique Identifiers Rule
The Enforcement Rule
The Privacy Rule
The ​HIPAA Privacy Rule establishes national standards to
protect individuals’ medical records and other personal health
information and applies to health plans, health care
clearinghouses, and those healthcare providers that conduct
certain health care transactions electronically. The Rule
requires appropriate safeguards to protect the privacy of
personal health information, and sets limits and conditions on
the uses and disclosures that may be made of such information
without patient authorization. The Rule also gives patients
rights over their health information, including rights to examine and obtain a copy of
their health records, and to request corrections. ​(http://www.hhs.gov) This assures the
patient that the health information is properly protected while providing high quality
health care. This also ​applies to all verbal, written and electronic information.

In Summary…
The Privacy Rule addresses the use and disclosure of Protected Health Information
(​PHI​) by organizations subject to the privacy rule (​Covered Entity​) and their partners
(​Business Associates​).

PHI
Protected Health Information
Any information that can be used to identify a patient - whether living or deceased - that
relates to the patient’s past, present or future physical or mental health or condition,
including the health care services provided and payment for those services

- Name
- Postal Address
- All elements of dates except year
- Contact information (e.g. Email address, phone number, fax number)
- URL & IP addresses
- Social Security Number
- Account numbers
- License numbers
- Medical record number
- Health plan beneficiary number
- Device and vehicle identifiers and serial numbers
- Biometric identifiers (finger and voice prints)
- Full face photos and other comparable images
- Any other unique identifying numbers, codes, or characteristics
Covered Entity

A Covered Entity is any individual, organization or


corporation that directly handles Personal Health
Information (PHI) or Personal Health Records (PHR) and
transmits health information in electronic form.

Examples are hospitals, doctor’s offices, health insurance


providers, health care clearinghouses, among others.

Business Associate
A Business Associate is a person who performs a function or activity in behalf of, or
provides services to a covered entity that involves PHI. This may include medical
software companies, health IT companies, medical billing companies and medical
transcription companies.

Business Associate Contract

A Business Associate Contract is an agreement


between a covered entity and a business
associate. The Privacy Rule requires that the
covered entity include certain protections for
the health information that their business
associates will use or disclose.
The Privacy Rule​:
General Principle for Use and Disclosure

A. Basic Principle
- PHI may be used or disclosed ​only if​:
(1) as the Privacy Rule permits or requires
(2) if the patient or personal representative of the patient authorizes in writing
- PHI of a deceased individual is protected for a period of 50 years following the
death of that individual.

B. Required Disclosures
- A covered entity ​must​ disclose PHI if:
(1) The individual or their personal
representative specifically requests access
to these information or when asks for an
accounting of disclosures of PHI
(2) HHS is undertaking compliance
investigation or review or enforcement
action

C. Permitted Uses and Disclosure


- A covered entity is permitted, but not required , to use and disclose PHI without
authorization ​only​ on the following purposes or situations:
(1) To the Individual
(2) Treatment, Payment, Health Care Operations
- e.g. by one or more provider, billing related transaction, referrals,
performance evaluations, audits
(3) With opportunity to Agree or Object
- informal permission by asking the patient outright, if incapacitated or in
an emergency situation
(4) Incidental use and disclosure
- as long as PHI was limited to the “minimum necessary”
(5) Public Interest and Benefit Activities
- required by law (child abuse, domestic violence), public health activities,
victims of abuse/neglect/domestic violence, health oversight activities,
judicial and administrative proceedings, law enforcement purposes,
decedents, cadaveric organ/eye/tissue donation, research, serious threat
to health or safety, essential government functions, worker’s
compensation
(6) Limited Data Set for the purposes of research, public health or health care
operations

The Privacy Rule​:


Authorized Uses and Disclosure

Authorization
A covered entity must obtain the individual’s ​written authorization for
any use or disclosure of protected health information that is not for
treatment, payment or health care operations or otherwise permitted or
required by the Privacy Rule.

An authorization must:
- be in plain language
- be Written in specific terms
- contain specific information regarding the information to be disclosed or used,
the persons involved, expiration, right to revoke in writing, and other data

The Privacy Rule​:


Limiting Uses and Disclosures to the Minimum
Necessary, Notice and Other Individual Rights

Minimum Necessary
A covered entity must make reasonable efforts to use,
disclose, and request only the minimum amount of
protected health information needed to accomplish the
intended purpose of the use, disclosure, or request.
(​www.hhs.gov​)

Access to and use of protected health information within a


covered entity must be restricted according to the specific
roles of the members of the workforce. Therefore, they
must develop and implement policies, procedures, and
technical safeguards to prevent unauthorized use and
disclosure.
Privacy Practices Notice

A covered entity must provide a notice of its privacy


practices except for certain circumstances and that it
should​ contain certain elements:
- must describe the ways in which the covered
entity will use and disclose PHI
- must contain the ways in which the covered
entity will ensure protection of privacy,
provision of a notice of privacy practice, and
compliance by the terms stated in the current
notice
- must describe the rights of the patient,
including the right to complain to HHS and to the covered entity if they feel that
their privacy has been violated
- must contain a contact person for more information or for complaints to the
covered entity

The Privacy Rule also specified the distribution requirements for direct treatment
providers, other health care providers and health plans.

● With direct treatment relationship:​


- No later than the first service encounter by personal delivery (for patient visits),
by automatic and contemporaneous electronic response (for electronic service
delivery), and by prompt mailing (for telephonic service delivery);
- By posting the notice at each service delivery site in a clear and prominent place
where people may reasonably be expected to be able to read the notice
- In emergency treatment situations, as soon as possible after the emergency
abates
- On request, whether direct treatment providers or indirect treatment providers
- Make it electronically available on websites maintained for customer service or
benefits information

● In an organized health care arrangement​:


- May use a joint privacy practices notice as long as each agrees to abide by the
notice’s content

● Health Plan​:
- Must distribute to each enrollee by its Privacy Rule compliance date
- Thereafter, must give its notice to each new enrollee upon enrollment and send
a reminder to every enrollee at least once every three years that the notice is
available upon request
A provider in a covered entity with direct treatment relationship with patients must
make sure to obtain a ​written acknowledgement of receipt of the privacy
practices notice except in an emergency treatment situation. If the provider fails to
do so, he or she must document the reason for any failure to obtain the patient’s written
acknowledgement.

Aside from those mentioned above, the Privacy Rule also has the following provisions:

● Access​. Patients have the right to review and get a copy of their protected health
information in a covered entity’s designated record set except in certain
circumstances.

● Amendment​. Patients have the right to request for amendment of their PHI in a
designated record set when that information is inaccurate or incomplete.

● Disclosure Accounting​. Patients have a right to an accounting of their PHI


disclosure by a covered entity or their business associates with a maximum
period of six years following the accounting request.

● Restriction Request​. Patients have the right to request that a covered entity
restrict the use of or disclosure of PHI during treatment or health care
operations, or disclosure to notify family members about the patient’s condition,
location or death. A covered entity is not obligated to agree to these requests but
if they do so, they must comply with the agreed restrictions except during medical
emergency.

● Confidential Communications Requirements​. Patients have the right to


request an alternative means or location for receiving communication of PHI by
means other than those the covered entity typically employs.
The Privacy Rule​:
Administrative Requirements

Covered entities must analyze their own


needs and implement solutions
appropriate to their environment, size and
resources. They must ensure the following:

● Implement written ​privacy policies and procedures that are consistent with
the Privacy Rule.

● Designate a ​Privacy Official/Personnel responsible for developing and


implementing the privacy policies and procedures, receive complaints and
providing individuals with information on the privacy practices of the entity.

● Train and manage all the workforce members on the privacy policies and
procedures necessary for them to carry out their functions. There must also be
appropriate sanctions for those who violate the privacy policies and procedures.

● Mitigate any harmful effect caused by the violation of the entity’s workforce
members of the Privacy Rule.

● Maintain appropriate administrative, technical, and physical ​data safeguards​.

● Have ​complaint procedures and must explain those procedures in its privacy
practices notice.

● No ​retaliation acts must be done by the covered entity against patients


exercising their rights provided in the Privacy Rule. ​Waivers may not be
required by the covered entity for patients as a condition for obtaining care,
payment and benefits eligibility.

● Maintain ​proper documentation and record retention until six years after
the last effective date. Includes privacy policies and procedures, privacy practice
notices, acknowledgements, disposition of complaints, other actions and
activities that the Rule requires to be documented.
The Privacy Rule​:
Personal Representatives and Minors

Personal Representatives
A Personal Representative is a person legally authorized to make health care decisions
on an individual’s behalf or to act for a deceased individual or estate. The Rule requires
that covered entities must treat a personal representative the same as the individual.
(www.hhs.gov)

Special Case: Minors


In most cases, parents are the personal representatives for
their minor children. Therefore, in most cases, parents can
exercise individual rights, such as access to the medical
record, on behalf of their minor children. In certain
exceptional cases, the parent is not considered the personal
representative. (www.hhs.gov)
The Security Rule​:
Overview

The HIPAA Security Rule applies to all covered entities and business associates who
transfer PHI ​in electronic form​. Its major goal is to protect the privacy of the
individual’s health information while allowing covered entities to adopt new
technologies to improve the quality and efficiency of patient care.

The Rule requires covered entities to maintain reasonable and appropriate


administrative, technical, and physical safeguards for protecting e-PHI, specifically:

1. Ensure confidentiality, integrity, and availability of all e-PHI they


create, receive, maintain or transmit

Confidentiality​: data or information is not


made available or disclosed to unauthorized
persons or processes.

Integrity​: data or information has not been


altered or destroyed in an unauthorized manner.

Availability:​ data or information is accessible


and useable upon demand only by an authorized
person.
100213928. Identify and protect against reasonably anticipated threats to
the security or integrity of the information

Risk Analysis and Management​: an ongoing process; covered entity


regularly reviews its records to track access to PHI and detect security incidents,
periodically evaluates the effectiveness of security measures put in place, and
regularly reevaluates potential risks to e-PHI

100213968. Protect against reasonably anticipated, impermissible uses or


disclosures

A. Administrative Safeguards
● Security Management Process/ Security Personnel​: designating a
security official
● Information Access Management​: role-based access of information
● Workforce Training and Management​: train all workforce and must
have appropriate sanctions
● Evaluation​: perform periodic assessment

B. Physical​ ​Safeguards
● Facility Access and Control​: must limit physical access to its facilities
while ensuring that authorized access is allowed
● Workstation and Device Security​: implement policies and procedures
to specify proper use of and access to workstations and electronic media

C. Technical Safeguards
● Access Control​: only authorized persons should access e-PHI
● Audit Control​: implement hardware, software, and/or procedural
mechanisms to record and examine access and other activities related to
PHI
● Integrity Control​: place electronic measures to confirm that e-PHI has not
been altered or destroyed
● Transmission Security​: implement technical security measures that guard
against unauthorized access to e-PHI that is being transmitted

100214056. Ensure compliance by the workforce


● Covered Entity Responsibilities​: must take reasonable steps to cure the breach
or end the violation
HIPAA and the use of Encryption

What is ​Encryption​?
- It is the process of turning readable text to an unreadable encrypted text that can
only be converted back to the original message if a decryption key (from the
sender) is obtained. Refer to the diagram below:

According to HIPAA’s Security Rule, Encryption is​ NOT required​, but ​only
addressable. ​This means that the entity is responsible for doing the necessary analysis
to determine if encryption is really needed or not.
- For ​Data at Rest​, meaning information is ​NOT crossing over to the
internet​, encryption is ​ADDRESSABLE.
- For ​Data in Transit​, meaning information is c​rossing over to the internet​,
encryption is ​REQUIRED​ when sensitive information such as ​PHI is
involved​.
- When encryption is not necessary according to the analysis done, the presence of
alternate protection such as ​Two-factor Authentication and Malware
Programs​ are enough.

HIPAA views ​email communication as inherently secure​ because data crosses


over the internet, which makes PHI vulnerable to cyber criminals. However, HIPAA
allows PHI to be sent via email provided that it is ​adequately protected​. The
company addresses by implementing these safeguards:
1. Standard encryption (TLS) done by Google​ - The company signed a
contract with Google wherein Google encrypts all emails sent using our corporate
Gmail accounts when it is​ in transit only​. The emails are then automatically
decrypted once they have arrived at the recipient’s inbox.

2. End-to-end encryption - ​If Google only encrypts the emails while in transit
only, end-to-end encryption means that the file is encrypted when it is in transit
and ​would still be encrypted after it has arrived in the inbox of the recipient​. This
means that the decryption process is no longer automatic and that the recipient
would ​need a decryption key from the sender to decrypt the file​.
HIPAA and Faxes Sent to Wrong Numbers
- According to HIPAA, in order for to address situations wherein faxes with PHI
are sent to the wrong number,​ ​a fax cover sheet that highlights the confidentiality
of the incoming file​. The fax cover sheet must state that the file contains
confidential information and should only be viewed by the intended recipient
only.
Penalties

A. Civil Penalties
● $100 per failure; may not exceed $25,000 per year​ for multiple violations of the
same requirement in a calendar year
● HHS may not impose civil money penalty under certain circumstances (if
violation is due to a reasonable cause, no willful neglect, corrected the violation
within 30 days)

B. Criminal Penalties
● $50,000 and up to one-year imprisonment​: knowingly obtains or discloses PHI
● $100,000 and up to five years imprisonment​: involves false pretenses
● $250,000 and up to ten years imprisonment​: involves intent to sell, transfer, or
use PHI to commercial advantage, personal gain or malicious harm

MedSpecialized’s Corrective and Disciplinary Actions

● Loss of privileges and/or termination of employment. Management’s


decision will depend on the degree of violation. This may range from issuance
of warning, suspension, and may even result to termination.
● Medspecialized may also resort to ​legal actions against the employee for
damage to company under the Philippine law.

How to Report Breaches


Part of your responsibility as a Medspecialized employee is to report privacy and
security breaches involving PHI to the following persons:
● Human Resource Department (​[email protected]​)
HIPAA Compliance & Data Protection
with Google Apps
Google rolled out a guide that helps Google Apps users comply with HIPAA (Health
Insurance Portability and Accountability Act) and HITECH (Health Information
Technology for Economic and Clinical Health).
The guide is intended for the following:
● Security officers
● Compliance officers
● IT administrators
● And other employees in organizations who are responsible for HIPAA
implementation and compliance with Google Apps.
Under HIPAA, certain information about a person’s health or health care services is
classified as Protected Health Information (PHI). It is therefore important to organize
data on Google services when handling PHI to comply with HIPAA.
Google Apps Customers who are subject to HIPAA and wish to use Google Apps with
PHI must sign a Business Associate Agreement (BAA) with Google. Under this
agreement, PHI is allowed only in a subset of Google Services called “included
functionality”.

These services must be configured by IT and is categorized into 3:


1. HIPAA Included Functionality which all users can access: This includes Gmail,
Google Drive, Google Calendar, Google Sites and Google Apps Vault.

2. Core Services where PHI is not permitted:Google Apps administrators can choose to
turn off Hangouts, Contacts and Groups.
3. Other Non-Core services offered by Google where PHI is not permitted, such as
Google+, YouTube, Blogger and Picasa Web Albums.
The admin has the ability to set up restrictions in Google Apps Core Services in the
sharing of PHI. For example, in Gmail and Google Drive, end users can choose to share
only with the intended recipients files that may potentially contain PHI. The same can be
done in Calendar and Google Site
The Google Apps administrator can also set up specific user access within the
organization based on whether the users handle PHI or not. This can be done by
placing users into groups.
To keep data safe and secure, several security practices are recommended including
the following:
● Set up 2-step verification to reduce the risk of unauthorized access in case a
user’s password is compromised

● Configure enterprise sender identity technologies — sender policy framework,


DomainKeys Identified Mail, and Domain-Based Message Authentication — to
prevent spammers and phishers from “spoofing” your domain
Also, it is the customer’s responsibility to ensure that appropriate HIPAA-compliant
measures are in place with any third party (or third party application) before sharing or
transmitting PHI.
A list of security and privacy controls available with Google Apps can be found on our
Security and Privacy website.
These additional resources may help you understand how Google services are
designed with privacy, confidentiality, integrity, and availability of data in mind.
● Google Apps Help Center
● Google for Work security page
● HIPAA Compliance with Google Apps
As a MedSpecialized, Inc. employee, what should you
do?

● Always lock your computer whenever you leave your station.

● Log out of computer systems after use.

● Avoid writing patient information on a piece of paper or sticky note. Any written

information should be destroyed after intended use.

● Protect PHI from accidental or intentional unauthorized use/disclosure in

computer systems (including social networking sites) and work areas. Do not

access these sites (Facebook, Twitter, etc.) when accessing a client’s computer

remotely.

● Limit accidental disclosures. Do not talk about a patient’s health information

outside of the office or to any colleague or individual not directly related to the

client’s case.

● Passwords and access codes should never be shared to anyone.

● Avoid using the same password in multiple programs or applications.

● Do not open email or click on embedded links from an unknown or untrusted

site.

● Do not browse non work related sites. If the computer or mobile device you are

using stores work-related sensitive information, personal use of the web is not

recommended.
● Do not download programs, software, and other media using work PC. If it is

needed, have the IT guy assist you.

● Be doubtful of emails asking you to disclose passwords, name, and other sensitive

information. Should you receive this kind of email, do not open it and discard it

right away.

● Nowadays, many harmful websites already have security certification, so just

relying on signs of a secured website may be problematic. The best way would be

to verify any links, especially suspicious ones or those that came from emails you

are not expecting.

● Avoid video streaming. Streaming media websites might seem harmless, but

watching or listening to streaming media may require downloading a special

media player that may contain malware.

● Using file sharing programs is prohibited as these frequently contain spyware

and are used to share files that contain malware. Some may also expose sensitive

information to unauthorized individuals if not configured correctly. Example of

P2P (Peer to peer) or file sharing programs are Limeware, BitTorrent, Ares,

BearShare, eMule, among others.

● Encryption is required when you are accessing your company email or a client’s

computer remotely using your mobile phone, device, or laptop.

● Do not open email attachments if the message looks suspicious, even if you

recognize the sender. When in doubt, throw it out.


● Do not respond to “spam”. Simply discard or delete it, even if it has an

“unsubscribe” feature.

● When transmitting or accessing PHI on mobile devices (laptop, tablets, mobile

phone), you must utilize the following security controls:

- strong power-on password

- automatic log-off

- display screen lock at regular intervals while the device is inactive

- encryption

● Never leave mobile devices unattended in unsecured areas.​ ​Remember, for any

mobile device, encryption is the best defense.

● Do not “auto-forward” messages from your company email to your personal

email or to anyone for that matter.

● When sending an email, do not include PHI or other sensitive information such

as Social Security numbers, unless you have proper written approval to store the

information and use encryption.

● Avoid storing sensitive information on mobile devices and portable media, but if

you must, you must use encryption.

● Always keep portable devices physically secure to prevent theft and unauthorized

access. Immediately report the loss or theft of any mobile computing device to

your supervisor and the HR department.

● Access information only as necessary for your authorized job responsibilities.


● Be careful when sending email blasts. Know when to use CC and BCC.​ ​When

sending emails containing PHI, limit it only to people who are directly related to

the task or case. Do not CC or BCC everyone.

Resources:

http://www.hhs.gov/ocr/privacy/hipaa/understanding/summary/privacysummary.pdf

http://www.hhs.gov/ocr/privacy/hipaa/enforcement/cmscompliancerev08.pdf

http://www.unc.edu/hipaa/Annual%20HIPAA%20Training%20current.pdf

You might also like