HIPAA for Dummies

hipaacompliance 3,446 views 51 slides Nov 12, 2018
Slide 1
Slide 1 of 51
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44
Slide 45
45
Slide 46
46
Slide 47
47
Slide 48
48
Slide 49
49
Slide 50
50
Slide 51
51

About This Presentation

The Health Insurance Portability and Accountability Act (HIPAA) was created primarily to modernize the flow of healthcare information, stipulate how Personally Identifiable Information maintained by the healthcare and healthcare insurance industries should be protected from fraud and theft, and addr...


Slide Content

HIPAA
FOR
DUMMIES
Everything you need to know

Health
Insurance
Portability and
Accountability
Act

1.
Why was HIPAA
Created?

The purpose
●Modernize the flow of healthcare information

●Stipulate how Personally Identifiable Information
maintained by the healthcare and healthcare insurance
industries should be protected from fraud and theft

●Address limitations on healthcare insurance coverage –
such as portability and the coverage of individuals with
pre-existing conditions

1996: The Secretary of Health and Human Services (HSS)
proposed standards that protect individual health information

1999: First set of proposed “Code Set” standards

2000: First proposals for the Privacy Rule

Nowadays: The scope of the Act has been extended to cover
Business Associates – third party service providers that perform
a function on behalf of a HIPAA-Covered Entity that involves the
use or disclosure of Protected Health Information (PHI).
The Timeline

The HIPAA regulations policies
U.S. Department
of Health &
Human Services’
Office for Civil
Rights (OCR)
State Attorney
Generals
Have the authority impose financial penalties on
Covered Entities and Business Associates for violations of
HIPAA

2.
What is the
Purpose of
HIPAA?

2004
HIPAA
Combat fraud
Combat abuse
1996
2007

We need to accommodate the
advances in technology and
changes to working practices

●HIPAA is
technology-neutral

●HIPAA does not preempt
state law, except in
circumstances in which
the state´s privacy and
security regulations are
weaker than those in
HIPAA.
OCR guidance has gone digital
(Listserv application)
Frequent guidance issued by
OCR
New HIPAA Rules

Original language of
HIPAA
HIPAA in 2018

3.
Understanding
HIPAA for
Dummies

Personal Identifiers
➔18 Personal Identifiers

➔Could reveal the identity of a person, their medical
history or payment records

➔Most commonly known as “Protected Health
Information” or “PHI”

➔Known as “ePHI” when stored or communicated
electronically

Names or part of names Any other unique identifying characteristic
Geographical identifiers Dates directly related to a person
Phone number details Fax number details
Details of Email addresses Social Security details
Medical record numbers Health insurance beneficiary numbers
Account details Certificate or license numbers
Vehicle license plate detailsDevice identifiers and serial numbers
Website URLs IP address details
Fingerprints, retinal and
voice prints
Complete face or any comparable
photographic images

Personal
Identifiers
Name or
part of
name
Phone
number
details
Geographical
identifiers
Details of
Email
addresses
Dates
directly
related to
a person
Medical
record
numbers
Certificate
or license
numbers
Website
URLs
Fingerprints,
retinal and
voice prints
IP
address
details
Social
Security
details
Vehicle
license
plate
details
Any other
unique
identifying
characteristic

Account
details
Health
insurance
beneficiary
numbers
Complete
face or any
comparable
photographic
images
Device
identifiers
and serial
numbers
Fax
number
details

The main takeaway for HIPAA compliance is
that any company or individual that comes
into contact with PHI must enact and enforce
appropriate policies, procedures and
safeguards to protect data.

Violations of HIPAA often result
from the following:
●Lack of adequate risk analyses
●Lack of comprehensive employee training
●Inadequate Business Associate Agreements
●Inappropriate disclosures of PHI
●Ignorance of the minimum necessary rule
●Failure to report breaches within the prescribed timeframe

OCR may refrain from imposing a
significant financial penalty on a
Covered Entity if the offence has
not resulted in the unauthorized
disclosure of PHI
Accidental offences
It is likely a course of
“corrective action” will be
required.
OCR does not consider
ignorance an adequate
excuse for HIPAA violations

4.
Who does
HIPAA apply
to?

Who does HIPAA apply to?
●“HIPAA Covered Entities” (Practically all health plans,
healthcare clearinghouses, healthcare suppliers,
endorsed sponsors of the Medicare prescription drug
discount card)

●Hybrid entities (employers who use schemes such as
the Employee Assistance Program (EAP)

●Business Associates - BA (entities who supply
services and perform certain functions for a Covered
Entities, during which they have access to PHI)

5.
HIPAA Rules
Explained

Enforcement Rule 05
Lays out how any resulting
investigations are carried out.
Determines appropriate fines
Omnibus Rule 04
Activated HIPAA-related changes
that had been part of HITECH
Breach notification
Rule
03
The Department of Health and
Human Services must be notified if a
data breach has been discovered
HIPAA Privacy
Rule
01
Dictates how, when and under
what circumstances PHI can be
disclosed.
02
Sets the minimum standards to
safeguard ePHI
HIPAA Security
Rule

6.
The Necessary and
Addressable
Security Measures
of HIPAA

Required or addressable security measures?
Practically every safeguard of
HIPAA is “required” unless there
is a justifiable rationale not to
implement the safeguard

Example where an addressable safeguard
might be not required:
Email encryption
Emails containing PHI only have to be encrypted
if they are shared beyond a firewalled, internal
server.

If a healthcare group only uses email as an
internal form of communication – or has an
authorization from a patient to send their
information unencrypted – there is no need
to adapt this addressable safeguard.

7.
HIPAA
Encryption
Requirements

PasswordEncryption
ePHI unreadable and undecipherable
▸Data can only be read to a key or code is applied
to decrypt the data.



Data encryption is mentioned in the HIPAA Security Rule,
but is only an addressable specification.

PasswordEncryption
▸If the decision is taken to use encryption :
The National Institute of Standards and Technology
(NIST) recommends Advanced Encryption Standard
(AES) 128, 192 or 256-bit encryption, OpenPGP, and
S / MIME.

▸If the decision is taken not to use encryption:
An alternative may be used in its place, provided it
is reasonable and appropriate and provides an
equivalent level of protection

8.
HIPAA
Password
Requirements

Even though password requirements are not
detailed in HIPAA, HIPAA covered entities should
develop policies covering the creation of
passwords and base those policies on current
best practices.

It is strongly recommended that healthcare
organizations follow the advice of NIST when
creating password policies.

Password requirements : advice of NIST
▸A minimum of 8 characters up to 64 characters, with
passphrases – memorized secrets – longer than
standard passwords.
▸No password hints storage
▸Designed to prevent commonly used weak passwords
from being set
▸There is no need to change passwords frequently
▸Multi-factor authentication should be implemented
▸NIST recommends salting and hashing stored
passwords using a one-way key derivation function

9.
HIPAA Record
Retention
Requirements

HIPAA Record Retention Requirements
There are no HIPAA record retention
requirements as far as medical records are
concerned but medical record retention
requirements are covered by state laws. Data
retention policies must therefore be developed
accordingly.


When medical records are retained,
they must be kept secure at all times.

10.
HIPAA
Violation
Reporting
Requirements

HIPAA Violation Reporting
▸Notifications must be issued to patients/health plan
members and to the HHS’ Secretary within 60 days
after the discovery of a breach.

▸The individual and media notices should include a
brief description of the security breach, the types of
information exposed, a brief description of what is
being done by the breached entity to mitigate harm
and prevent future breaches

▸A copy of the breach notices should be retained

10.
Top 10 most
Common HIPAA
Violations

Risk Analysis Failures
Failure to perform a comprehensive,
organization-wide risk analysis.
1

Risk Management
Failures
Risk management is critical to the security
of ePHI and PHI and is a fundamental
requirement of the HIPAA Security Rule.
2

Lack of Encryption or
Alternative Safeguards
3

Security Awareness
Training Failures
HIPAA requires covered entities and
business associates to implement a
security awareness training program for all
members of the workforce.


4

Improper Disposal of PHI
When PHI or ePHI is no longer required it
must be disposed of securely in a manner
that ensures PHI is “unreadable,
indecipherable, and otherwise cannot be
reconstructed.”


5

Impermissible
Disclosures of PHI
An impermissible disclosure of PHI is a
disclosure not permitted under the HIPAA
Privacy Rule.


6

Failure to Adhere to the
Minimum Necessary
Standard
7

Failure to Provide
Patients with Copies of
PHI on Request
The Privacy Rule permits patients to access
and obtain copies of their protected health
information on request


8

Failure to Enter into A
Business Associate
Agreement
9

Failure to Issue Breach
Notifications Promptly
Breach notifications must be issued
without unreasonable delay and no later
than 60 days from the date of discovery of
the breach.


10

11.
Explaining
HIPAA to
Patients

The best fashion to explain HIPAA to
patients is to put the relevant information
in the Privacy Policy, and then give the
patients a summary of what the policy
contains

12.
Explaining
HIPAA to
Staff

In order to adhere with HIPAA, organizations must
compile privacy and security policies for their
employees, and a sanctions policy for staff
member who do not comply with the
requirements.

The best method of explaining HIPAA to
employees is in special compliance training
tutorials. Compliance training sessions should
be short and often.

If you are unsure about any element
of HIPAA, it is recommended you
seek professional help

HIPAA
FOR
DUMMIES
You now know everything!
https://www.hipaaguide.net/hipaa-for-dummies/