750 likes | 913 Views
Domain V - Privacy , Security, and Confidentiality (13% ). RHIA Prep Workshop Test Year 2014. Objectives. 1 . Design and implement security measures to safeguard Protected Health Information (PHI) 2 . Manage access, disclosure, and use of PHI to ensure confidentiality
E N D
Domain V - Privacy, Security, and Confidentiality (13%) RHIA Prep Workshop Test Year 2014
Objectives 1. Design and implement security measures to safeguard Protected Health Information (PHI) 2. Manage access, disclosure, and use of PHI to ensure confidentiality 3. Investigate and resolve healthcare privacy and security issues/problems 4. Develop and maintain healthcare privacy and security training programs
What is PHI? As Per HIPAA’s Privacy Rule “Individually-identifiable health information" held or transmitted by a covered entity or its business associate, in any form or media, whether electronic, paper, or oral
Individually-identifiable Health Information Demographic data, that relates to: • the individual’s past, present or future physical or mental health or condition or • the provision of health care to the individual or • the past, present, or future payment for the provision of health care to the individual
IIHI… And …that identifies the individual Or … provides a reasonable basis to believe can be used to identify the individual Examples of common identifiers: name address birth date Social Security Number
Ownership of Health Record • Physical Record = property of provider • Information in the Record • Patient has the right to access the information* • Patient has an interest in the content • Patient has limited rights to control the disclosure and use of content *Except psychotherapy notes
Confidentiality A legal as well as ethical obligation between health care professional and patient However… sharing PHI enables other health care professionals to care for patients more efficiently and safely
Confidential Information • Information derived from clinical relationship • Information given in the belief that it will not be disclosed to another party • Information that has some connection with the provider’s task of caring for the patient
Super Confidential Information HIV status Pregnancy termination History of mental health problems History of drug and alcohol abuse ALWAYS requires Express Consent
Release of Information • Express authorization is required before release to: • Patient's attorney or insurance company • Patient's employer, unless a worker's compensation claim is involved • Member of the patient's family, except where the family member has been appointed • The patient's attorney under a durable power of attorney for health care • Government agencies • Other third parties as designated by law
Release of Information Permittedwithout patient’s express authorization for: To the Individual (unless required for access or accounting of disclosures) Treatment, Payment, and Health Care Operations Opportunity to Agree or Object Incident to an otherwise permitted use and disclosure Public Interest and Benefit Activities Limited Data Set for the purposes of research, public health or health care operations Rely on professional ethics and best judgments in deciding
Release of Information Before forwarding medical records to an • MCO • utilization review programs • other health programs • physicians, hospitals, and others it is recommended to get the patient's express permission for release of medical records
Release of Information Form Description of specific information to be used or disclosed Name of person/entity disclosing PHI Name of person/entity receiving PHI Expiration date Ability to revoke Authorizing signature
Release of Information Failure to get the patient’s release for medical records may have serious results 21 States punish improper disclosure of confidential information by revoking a physician's medical license or taking other disciplinary action
Types of Consent Implied Consent – implied by patient’s behavior Express Consent – specific and in writing Informed Consent – after understanding
Informed Consent Advising patient: Reasons for the treatment Treatment options including alternatives Prognosis after this treatment Prognosis without this treatment Possible complications of this treatment
Informed Consent Evidence of consent Dated, timed, and signed informed consent prior to treatment Must be included in patient’s record
Consent Needed Consent to Treat – patient has the right to refuse treatment Consent to Release Information (PHI)
Other Consents • Advance Directive • Living will -- DNR (Do Not Resuscitate) • Durable Power of Attorney for health care • Healthcare Surrogate • Subpoena[court order requiring testimony] • Subpoena ducestecum[court order requiring specific documents to be produced]
Who Can Consent Patient [competent adult/emancipated minor] Patient’s legal representative [patient is incompetent or a minor child] Administrator or executor of the patient's estate [patient deceased] Court of law
Amending The Record Individuals have the right to request an amend of PHI in a designated record set when that information is inaccurate or incomplete Amendment request accepted: Provider must amend the record and make reasonable effort to provide the amendment to those needing it, and to those who rely on the information to the individual’s detriment
Amending The Record • Request denied: covered entities must provide the individual with a written denial and allow the individual to submit a statement of disagreement for inclusion in the record. • The Rule specifies processes for requesting and responding to a request for amendment.
Practice Question #1 Which of the following situations violates the patient’s privacy? Hospital sends out invitation on free childbirth classes to all patients scheduled for delivery Physician on the Quality Improvement Committee reviews patient records Hospital gives pharmaceutical company patient names and addresses for mass mailing of free drug samples Hospital uses aggregate data to determine if a new operating room is needed
Practice Question #2 A patient has requested an electronic copy of her medical record to be sent to her physician. The correct action is ___? None, this is prohibited by HIPAA None, this is prohibited by other laws Patient has right to electronic copy, but only to be sent to the patient Patient has right to electronic copy to be sent to the patient or other designated person
Practice Question #3 The patient has been told that there are some records to which she cannot have access. These are most probably __? Psychotherapy notes Alcohol and drug records AIDS records Mental health assessment
Practice Question #4 Which statements is true about when PHI can be disclosed to family members? Patient’s mother can always receive child’s PHI Family member lives out of town and cannot visit in person Family member is a health care professional Family member is directly involved in patient’s care
Practice Question #5 Protected health information includes: Only electronic individually identifiable health information Only paper individually identifiable health information Individually identifiable health information in any format stored by health care provider Individually identifiable health information in any format stored by health care provider or business associate
Practice Question #6 A subpoena ducestecum is received in connection with a lawsuit. The subpoena does not state whether the named individual is a party to the lawsuit, and, if so, whether the individual is the plaintiff or defendant. In addition, the subpoena does not indicate whether the requesting attorney represents the plaintiff or the defendant in the lawsuit. Which of the following would be the strongest argument for refusing to comply with the subpoena? A. There is neither an actual nor an implied waiver of right to privacy by the patient. B. There is no indication as to whether the named individual is a party to the lawsuit. C. A subpoena must be served by the local law enforcement agency. D. It is not known whether the patient is the plaintiff or defendant.
Security • Maintain physical and electronic protection • Integrity • Availability • Confidentiality • Maintain resources to enter, store, process, and communicate PHI • Utilize tracking system to locate records • Educate personnel re: confidentiality of PHI
Security Integrity = not altered or destroyed in unauthorized manner or by unauthorized person Availability = accessible and usable on demand by authorized person(s) Confidentiality = not used or disclosed to unauthorized person(s)
Security • Protect against reasonably anticipated threats • Unauthorized access • Loss • Theft • Tampering • Destruction
Security “Covered entities must review and modify their security measures to continue protecting e-PHI in a changing environment.” --HIPAA’s Security Rule
Authentication • Identification and confirmation of identity of users • Who is this user? • Is the user actually who he or she claims to be? • Relies on specific, unique fact • Password • Fingerprint • Security question
Authorization • The level of access permitted • What records can be accessed? • Read only permission • Read and write permissions • Read, write, and edit permissions
De-Identified Information Individually identifiable details are omitted or blacked out Also known as “redacted”
Security Administrative Safeguards Requires a risk analysis to be performed Risk analysis should be ongoing/ performed on a regular basis to evaluate and correct
Administrative Safeguards Identify and analyze potential risks to ePHI Implement security measures to reduce risks and vulnerabilities A Security Officer must be designated to be responsible for development and implementation of security policies and procedures
Risk Analysis • Evaluate the likelihood and impact of potential risks to e-PHI • Implement appropriate security measures to address the risks identified in the risk analysis • Document the chosen security measures and, where required, the rationale for adopting those measures • Maintain continuous, reasonable, and appropriate security protections.
Practice Question #7 You have been assigned the responsibility of performing an audit to confirm that all of the workforce’s access is appropriate for their role in the organization. This process is called___? Risk assessment Information system activity review Workforce clearance procedure Information access management
Practice Question #8 Which of the following is subject to the HIPAA Security Rule? X-ray films stored in radiology Paper medical records Faxed records Clinical data repository
Information Access Management Implement policies and procedures for authorizing access to e-PHI only when such access is appropriate based on the user or recipient's role (role-based access)
Workforce Training & Management Appropriate authorization and supervision of workforce members who work with e-PHI Train all workforce members regarding its security policies and procedures Apply appropriate sanctions against workforce members who violate its policies and procedures.
Physical Safeguards • Limit physical access to its facilities while ensuring that authorized access is allowed • Specify proper use of and access to workstations and electronic media • Implement policies and procedures related to the transfer, removal, disposal, and re-use of electronic media, to ensure appropriate protection of e-PHI
Technical Safeguards Ensure only authorized persons have access to e-PHI Record and examine all activities in information systems that contain or use e-PHI Ensure that e-PHI is not improperly altered or destroyed Guard against unauthorized access to e-PHI that is transmitted over an electronic network
Practice Question # 9 Intentional threats to security could include A natural disaster (flood) Equipment failure Human error (data entry error) Data theft (Unauthorized downloading of files)
Practice Question #10 Facility access controls, workstation use, workstation security, and device/media controls are all part of Physical safeguards Technical safeguards Administrative safeguard Organizational requirements
Records Retention • Factors influencing retention of health information: • Health care providers’ ability to continue to provide care, educate, research, and defend a professional liability action • Storage constraints • Historical value • Research and education
Records Retention • Medium for storing records (electronic, paper, etc.) • New technology • Fiscal concerns
Retention Schedule Adult Record = 10 years after last encounter Minor Record = Until age of majority + statute of limitation for malpractice lawsuits Imaging = 5 years Disease index = 10 years Physician index = 10 years Operative index = 10 years
Retention Schedule Fetal heart monitor record = Until age of majority + 10 years Master patient index = Permanently Register of births = Permanently Register of deaths = Permanently Register of surgical procedures = Permanently