60 likes | 181 Views
Security of eHealth Information HIPAA Compliance at HRA. Group: GTR ver M Grace Chen Taru Singhal Robert Szymanek Michael Parker. About HRA. Health Research Analysts (HRA) is classified as a healthcare clearing house
E N D
Security of eHealth InformationHIPAA Compliance at HRA • Group: GTR ver M • Grace Chen • Taru Singhal • Robert Szymanek • Michael Parker
About HRA • Health Research Analysts (HRA) is classified as a healthcare clearing house • HRA collects information on medical outcomes, a type of PHI, from healthcare service providers • HRA builds a national registry of outcome-related information
Identify the Problem • How best do we capture, store and transmit PHI data? • How is the data stored? • How is a secure backup performed? • How is it encrypted? • What is the physical security? • How do we archive data? • Transmission of data? • What is the best way to transmit data? • What Is the best encryption • Is E-mail safe? ftp/sftp?
What is HIPAA • HIPAA is the acronym for the federal legislation titled Health Insurance Portability and Accountability Act of 1996. • HIPAA was designed to protect patients from disclosure of protected health information (PHI). • Patients must be informed of their rights with their PHI, authorize release of information, have the right to see and amend their medical record, and be informed of what is released.
Why Compliance? • The HIPAA Privacy Rule applies to: • Health plans • Healthcare clearinghouses, part of an HIO • Healthcare providers that conduct covered transactions • Healthcare Information Organization (HIO) performs certain functions or activities which require access to PHI • Healthcare clearinghouses collect data such as PHI and data-mine them
Two key parts of HIPAA (1) the Privacy Rule • which protects the privacy of individually identifiable health information (2) the Security Rule • which sets national standards for the security of electronic protected health information