220 likes | 229 Views
Explore HIPAA regulations covering individual rights, PHI protection, authorization requirements, security threats, and risk analysis in Electronic Health Records. Learn about business continuity concepts and key safeguards to ensure compliance.
E N D
Privacy and Security Within the Electronic Health Record Laurie Rinehart-Thompson, JD, RHIA, CHP, FAHIMA Professor – Health Information Management and Systems Laurie.rinehart-thompson@osumc.edu
Learning Objectives • Identify the individuals, organizations and information covered by HIPAA • Apply the HIPAA Privacy Rule’s authorization requirements to uses and disclosures of health information • Explain the HIPAA Privacy Rule’s individual rights • Identify the HIPAA Security Rule’s physical, technical and administrative safeguards • Describe security threats to electronic health information and identify breaches in the EMR • Explain risk analysis and business continuity concepts as they relate to electronic health information
HIPAA (Health Insurance Portability and Accountability Act of 1996)
WHAT is protected health information? (PHI) • Consider #1 of the three-part test: How do we know if we can identify a person from the information? • It actually identifies the person (eg, Robert Smith) • Or there is a reasonable basis to believe the person can be identified from the information • This might be through expert determination or when any of 18 identifiers are present in the information. • This includes items such as dates of admission or discharge, or a person’s birth or death date – but can also be items like social security number, email address or medical record number
Identifying PHI • “A 67-year-old male who underwent a hernia repair.” • A hospital possesses this information • “A 92-year-old patient resides in Anytown, Ohio.” • Dr. Jones’ dental practice possesses this information • Anytown’s population is 6,000.
Authorization to Use PHI • Authorization: A patient’s signed agreement to a specific use or disclosure of PHI. • An authorization must contain specific elements to be valid. • The general rule per HIPAA is that, for PHI to be used or disclosed, an authorization is required. However, there are many exceptions.
When is an authorization not required? • There are 18 different exceptions, but they include situations such as: • Reporting infectious disease data for public health monitoring • For certain law enforcement uses such as locating a fugitive • For national security purposes • To report situations that involve abuse, neglect, or domestic violence • To support a workers’ compensation claim
Applying HIPAA Individual Rights • Mrs. Smith is upset to find that the physician has listed type I diabetes as a diagnosis in the EMR. Does Mrs. Smith have any rights regarding this diagnosis, which she believes is incorrect? What can Mrs. Smith do, and which individual right does this exemplify? • Mr. Baker wants a copy of his record. Must he sign an authorization to receive it? What individual right does this exemplify?
Risk Analysis • The HIPAA Security Rule’s administrative safeguards require a risk analysis, which entails: • System characterization • Threat identification • Identifying vulnerabilities • Control assessment • Likelihood determination • Impact analysis • Risk determination • Control recommendations • Results documentation
Summary • Identify the individuals, organizations and information covered by HIPAA • Apply the HIPAA Privacy Rule’s authorization requirements • Explain the HIPAA Privacy Rule’s individual rights • Identify the HIPAA Security Rule’s physical, technical and administrative safeguards • Describe security threats to electronic health information and identify breaches in the EMR • Explain risk analysis and business continuity concepts as they relate to electronic health information
Conclusion • Thank you for reviewing the module within IHIS Learn. After completing the exercises associated with this module within the IHIS Learn environment, please return to Carmen to complete the required end-of-module survey before the deadline specified in Carmen. Through this survey you will provide feedback about your experience with the learning module and answer some questions to gauge your knowledge after completing the module. • If you have any questions about the module content, please contact me at: laurie.rinehart-thompson@osumc.edu
Reference • Health Insurance Portability and Accountability Act (HIPAA) Administrative Simplification. 45 CFR Parts 160 and 164. 2013.