120 likes | 211 Views
power point presentation with speaker notes
E N D
Health Information Privacy And Security • Health care system is moving rapidly into the digital age. • Increasing focus on health information technology and health information exchange. • Health IT initiatives pose security and privacy risks. • Lack of a comprehensive approach towards health security and privacy issues. • Privacy and security protections are critical to Health IT. • Helps in rapid adoption of health technology and bolstering patient trust and confidence in quality of care.
Health Information Privacy And Security • Majority is concerned about health identity thefts and misuse of medical information. • Protecting privacy and security leads to good health care system. • Computerization of patient information magnifies the risk in the absence of security and privacy systems. • A comprehensive security and privacy framework is the need of time in the transition towards e-health care.
Principles of a Security and Privacy Framework • Openness and Transparency • Purpose Specification and Minimization • Collection and Use Limitation • Individual Participation and Control • Data Integrity and Quality • Security Safeguards and Controls • Accountability and Oversight • Remedies
Role of HIPAA • HIPAA- Health Insurance Portability and Accountability Act enacted by Congress in 1996. • HIPAA provides for information security and privacy of medical information in the digital age. • Sets standards for electronic transactions and codes relating to health claims, payments and remittance advices of individually identifiable information. • Concrete framework ensuring safety, security and integrity of e-information. • Simply, HIPAA protects patients’ health information maintained by hospitals.
HIPAA in the new environment • HIPAA protects the access, use and disclosure of Protected Health Information (PHI) through security measures and privacy measures. • Protected Health Information • Privacy • Security • It protects those covered by health insurance plans who are called ‘covered entities’. • PHI refers to any individually identifiable information like name, telephone no etc being stored or transmitted by a covered entity in paper or electronic format.
HIPAA Shortcomings • Insufficient regulation to cover the rapidly evolving e-health environment. • Most health information organizations are not covered entities and HIPAA standards will not apply to these. • Does not cover personal health records and consumer access services maintained by third parties. • Personal health data migrating on the Internet is not regulated by HIPAA. • HIPAA rules are not adequately enforced due to which penalties are not levied on violations.
STATE LAWS • Gaps in HIPAA are filled by State health privacy and security legislations. • State laws can be implemented even if they are contrary to HIPAA but necessary to regulate health care and prevent fraud. • Which is more stringent shall be implemented. • State laws are more focused on practice while HIPAA applies to the use of information. • State Laws include all health organizations unlike HIPAA which applies to only covered entities.
CONCLUSION • Privacy and security of patients’ health information has become a challenging issue for the health organizations. • Loss of personal health information can result in • Bad reputation of a business • Commercial advantage or personal gain • Use of information in marketing activities • False entries in health records
RECOMMENDATIONS • Place strict user authorization and encryption systems • Screen employees for previous fraud incidents. • Ensure the application of security protocols. • Check on employees for massive downloads and viewing of inappropriate data. • Insurance against data breaches. • Conduct third-party audits. • Maintain a good track record.
REFERENCES • Withrow, S.C. (2001). Managing HIPAA Compliance: Standards for Electronic Transmission, Privacy, and Security of Health Information. Health Administration Press. • Dennis, J.C. (2000). Privacy and Confidentiality of Health Information. Jossey-Bass. • Mack, D.M. & Boyle, L.M. (2003). HIPAA: A Guide to Healthcare Privacy and Security Law. Aspen Publishers. • Beaver, K. & Herold, R. (2003). The Practical Guide to HIPAA Privacy and Security Compliance. AUERBACH.
Fuller, S.R. ( 1997). Security and access control: Guidelines for managing electronic patient information. AHIMA. • Goldberg, A.S. (2001, May 2). HIPAA & healthcare: a new way of sharing and caring. Retrieved from http://www.ehcca.com/presentations/ehc-info3/goldberg2.pdf • Goldman, J. (1998). Protecting privacy to improve healthcare. Health Affairs, Nov-Dec, 18-22. • Fox, S.J. & Szabo, D.S. (2007). Managing Information Privacy and Security in Healthcare. In Thielst, C.B. & Jones, L.E. (Eds.), Guide to Establishing a Regional Health Information Organization. Chicago: HIMMS.