21
Patient Confidentiality Training which will assist in the prevention of HIPAA violations Tina Norris

Norris, t week 1 discussion 2

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: Norris, t week 1 discussion 2

Patient Confidentiality

Training which will assist in the prevention of HIPAA violations

Tina Norris

Page 2: Norris, t week 1 discussion 2

Promulgate the monetary consequences of violating HIPAA

1 violation 30 violations

$100 per victim at minimum fine $1.5 million per victim at maximum fine

Page 3: Norris, t week 1 discussion 2

Complying with HIPAA

• Hospitals, physicians, and their business partners must ensure that all HIPAA privacy and security provisions are not only adopted, but are completely current as well (Withrow, 2010).

Page 4: Norris, t week 1 discussion 2

PRIVACY COMPLIANCE PROTOCOLS

What every healthcare leader should know about HIPPA privacy compliance:

Page 5: Norris, t week 1 discussion 2

Efforts should be focused on high-risk areas such as (1) information access management, (2) access control, and (3) impermissible disclosures of PHI;

Page 6: Norris, t week 1 discussion 2

Business associate agreements must be reviewed in order to verify that business associates accept the direct HIPPA obligations, and indemnify the hospital and physicians for any HIPAA violations;

Page 7: Norris, t week 1 discussion 2

All healthcare leaders must provide HIPAA training and appropriate monitoring to confirm continuing compliance (Withrow, 2010).

Page 8: Norris, t week 1 discussion 2

Privacy safeguards include (1) ensuring that all documents containing PHI are shred before their disposal and (2) ensuring that doors to medical records departments, including file cabinets, are kept locked and that which personnel are authorized to have the key or passcode is limited (Sarrico &Hauenstein, 2011).

Page 9: Norris, t week 1 discussion 2

Institute restrictions on which application and module within that application a user can access, despite the user’s having established his/her ID at logon (Sarrico & Hauenstein, 2011).

Page 10: Norris, t week 1 discussion 2

For more information on HIPAA privacy policies, go to www.tulane.edu/counsel/upco/privacy-policies.cfm. and/or to www.nyu.edu/its/policies/#hipaa. (Withrow, 2010).

Page 11: Norris, t week 1 discussion 2

SECURITY COMPLIANCE PROTOCOLS FOR ENSURING EHRS/HIES COMPLY

What every healthcare leader should know about HIPAA security compliance:

Page 12: Norris, t week 1 discussion 2

Be aware that the first documents an investigator is likely to want to see are the risk assessment and resulting policy and procedural protocols for the physical, administrative, and electronic security of ePHI (Wieland, 2010).

Page 13: Norris, t week 1 discussion 2

Draft a risk assessment analysis by which protocols for the physical, administrative, and electronic security of ePHI will be devised (Wieland, 2010).

Page 14: Norris, t week 1 discussion 2

Tighten internal compliance procedures;

Page 15: Norris, t week 1 discussion 2

Extensively conduct regular training of all employees;

Page 16: Norris, t week 1 discussion 2

Train also the employees of all provider-partners;

Page 17: Norris, t week 1 discussion 2

Have signed privacy agreements with all employees;

Page 18: Norris, t week 1 discussion 2

Extensively conduct regular audits to ensure compliance (Sarrico & Hauenstein, 2011).

Page 19: Norris, t week 1 discussion 2

For more information on drafting a risk assessment analysis pursuant to HIPAA, go to www.hhs.gov/ocr/privacy/hipaa/administrative/securityrule/radraftguidanceintro.html (Wieland, 2010).

Page 20: Norris, t week 1 discussion 2

References

• Sarrico, C., & Hauenstein, J. . (2011). Can EHRs and HIEs get along with HIPPA security requirements? . hfm (Healthcare Financial Management), 65(2), 86-90. Retrieved October 19, 2011, from EBSCOhost.

• Wieland, J. B. . (2010). Liability and the lab. HIPAA: The new enforcement culture. MLO: Medical Laboratory Observer, 42(11), 42. Retrieved October 19, 2011, from EBSCOhost.

Page 21: Norris, t week 1 discussion 2

References

• Withrow, S. . (2010). How to avoid a HIPAA horror story. hfm (Healthcare Financial Management), 64(8), 82-88. Retrieved October 19, 2011, from EBSCOhost.