Title: Carol Ann Raymond
1HIPAA OVERVIEW
- Carol Ann Raymond
- UGA Speech and Hearing Clinic
- Department of Communication Sciences and
- Special Education
- Technology and Data Management Security Liaison
Meeting - February 10, 2006
2HIPAA Overview
- Description
- Scope
- Covered Entities
- Administration Simplification
- Electronic Data Interchange
- National Provider Identification
- Privacy
- Security
- Enforcement
3HIPAA
- Health Insurance Portability and Accountability
Act of 1996 (P.L. 104-191) - Reforms insurance market and simplifies health
care administrative processes - Developed and enforced by the U.S. Department of
Health and Human Services - Office of Civil Rights (OCR)
- Centers for Medicare Medicaid Services (CMS)
- Prevails in all covered regulations unless state
laws are more restrictive.
4Purpose
- Improve portability and continuity of health
insurance coverage in group and individual
markets - Combat waste, fraud and abuse in health insurance
and health care delivery - Promote use of medical savings accounts
- Improve access to long-term care services and
coverage - Simplify administration of health insurance
5HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY
ACT
I. Healthcare Insurance Access, Portability, and
Renewability
II. Preventing Healthcare Fraud Abuse
III. Tax- Related Health Provisions
IV. Group Health Plan Requirements
V. Revenue Offsets
Administration Simplification
Privacy 4/14/03
Electronic Data Interchange
Security 4/20/05
Transactions 10/02
Code Sets 10/02
Identifiers
National Provider Identifier 5/23/07
6HIPAA Titles Key Points
7Covered Entities Administration Simplification
- Healthcare providers, health plans, and
clearinghouses who transmit any health
information in electronic form - Insurance claims, eligibility, etc.
- Business Associates
- Services provided on behalf of the covered
entity, involving the use or disclosure of
protected health information (PHI) - E.g., consultants, accreditation agencies,
vendors, etc. - Must sign agreement to comply with HIPAA
8UGA Designated Health Care Components
- Center for Counseling - College of Education
- Employee Benefits Division - Human Resources
Department - Psychology Clinic - Franklin College of Arts and
Sciences - McPhaul Marriage and Family Therapy Clinic
- Medication Access Program - College of Pharmacy
- School Psychology Clinic - College of Education
- University Health Center
- Office of Legal Affairs
- Speech and Hearing Clinic - College of Education
- Wellness Clinic - College of Pharmacy
9Administration Simplification
- To improve efficiency and effectiveness
- To reduce costs of healthcare system
- Electronic Data Interchange (EDI)
- Transactions - Single standard format for
electronic submissions - Claims submissions, eligibility inquiry,
enrollments, health care payments, transmitted
patient data, etc. - Code sets (diagnostic and procedure codes, etc.)
- Identifiers
- National Provider Identifier
- Employer Identifier
- National Individual Identifier
10National Provider Identification
- All HIPAA covered healthcare providers must apply
for single provider identification number - Includes individuals and organizations
- Number will not change regardless of job or
location changes - Paper or web-based application process
- May be filed in bulk enumeration in Electronic
File Interchange (EFI) process by organization on
providers behalf - Required by May 23, 2007
11HIPAA Privacy Security Rules
- Privacy Rule
- What information must be kept confidential
- Defines use and disclosure of PHI
- Defines how patient rights are to be protected
- Includes all forms of Protected Health
Information (PHI) - Paper, electronic, and oral
- Security Rule
- How ePHI will be kept confidential (physical and
technical means). - Covers PHI that is in electronic form only (ePHI)
- Must have Security to ensure Privacy
12Privacy Rule General Requirements
- Designate a Privacy Official
- Develop Notice of Privacy Practices
- Develop Acknowledgement Form
- Develop Authorization Form
- To use or disclose PHI for purposes other than
- Treatment,
- Payment, or
- Health Care Operations
TPO
13Privacy Rule Cont
- Develop Business Associate Agreements
- Develop Policies Procedures for Handling PHI
- Develop Minimum Necessary Use Policies
- Develop Security Safeguards
- Develop a Training Program
- Develop Complaint Process
- Develop Sanctions for Infractions
14Protected Health Information (PHI)
- Information which relates to the physical/mental
health or condition of an individual that - Identifies the individual or with respect to
which there is reasonable basis to believe the
information can be used to identify the
individual - Includes
- Electronic or paper records, oral information
- Exception
- Education records covered by the Family
Educational Rights and Privacy Act (FERPA) - Employment records held in role as employer
15PHI Identifiers
- Social Security number
- Health plan beneficiary numbers and other
identifying information - Account numbers
- Certificate of license numbers
- Vehicle identifiers and serial numbers to include
license plate numbers - Device identifiers and serial numbers
- Web Universal Resource Locators (URLs)
- Internet Protocol (IP) address numbers
- Full face photographic images and other
comparable images
- Name
- Medical record numbers
- Geographic subdivision smaller than a state
including street address, city, county, precinct,
zip code - Any and all dates (except the year), including
birth date, encounter date, and date of death - Telephone numbers
- Fax numbers
- Electronic mail addresses
- Any other unique identifying number,
characteristic or codes
To De-Identify Remove All Identifiers
16Privacy Rule Individual Patient Rights
- Individuals have a right to
- Receive a Notice of Privacy Practices
- Receive PHI by alternative means or at
alternative locations to protect confidentiality
- Review and obtain a copy of their protected
health information - Request amendments of protected health
information - Request that uses and disclosures of health
information be restricted and - Request an accounting of certain disclosures of
PHI for purposes other than TPO.
17Security Rule
- Covers all electronic PHI (ePHI), whether it is
being stored or transmitted - Requires implementation of appropriate
administrative, technical, and physical
safeguards for ePHI - Is technology neutral - what to do, not how
- Is scalable and flexible - takes into account
- Size, complexity and capabilities of the entity
- Technical infrastructure, hardware, and software
security capabilities - Costs of security measures
- Probability and criticality of potential risks
18Security Standards General Rules
- (1) Must ensure the confidentiality, integrity,
and availability of ePHI - Confidentiality Data or information is not made
available or disclosed to unauthorized persons - Integrity Data or information is not altered or
destroyed in an unauthorized manner - Availability Data or information is accessible
and usable upon demand by an authorized person - 160.306(a)
19Security Standards General Rules
- (2) Must protect against any reasonably
anticipated threats or hazards to the security or
integrity of ePHI - (3) Must protect against any reasonably
anticipated uses or disclosures that are not
permitted by privacy rules - (4) Must ensure compliance with workforce
20Security Standards (18)
- Specifications (42)
- Required
- Specification must be implemented as stated
- Addressable (not optional)
- Assess whether each specification is reasonable
and appropriate for its environment to protect
ePHI. - If reasonable and appropriate - Implement as
stated - If not reasonable and appropriate,
- Document rationale and implement an equivalent
alternative measure, if reasonable and
appropriate
21Safeguard Categories
- Administrative Safeguards
- Administrative actions, policies, and procedures
to protect ePHI and to manage the conduct of the
workforce - Access controls, risk analysis, risk management,
training, incident reporting, business associates
contracts, etc. - Physical Safeguards
- Physical measures, policies and procedures to
protect electronic information systems and
related buildings and equipment from natural and
environmental hazards and unauthorized intrusion - Locks and keys, disposal methods, data backup and
storage requirements, etc. - Technical Safeguards
- The technology and policies that protect ePHI and
control access to it - Authentication of users, audit logs, data
integrity checks, and transmission
security/encryption, etc.
22Safeguards - Departmental Procedures
- Administrative Safeguards
- Risk Analysis (R)
- Identify threats, vulnerabilities, security
controls, etc. - Risk Management (R)
- Identify, control, minimize, or eliminate
security risks - Physical Safeguard
- Workstation Security (R)
- Restrict access to authorized users
- Identify all workstations that access ePHI
- Departmental Procedures Example
- SF 10 COE Security Access Log
- SF 11 Electronic Device Inventory/Audit
23Enforcement
- Civil Penalties
- Up to 100/per person, per violation, up to
25,000 per year - Criminal Penalties
- Knowing misuse of PHI up to 50,000 and/or up to
one year imprisonment - Under false pretences up to 100,000 and/or
up to five years imprisonment - Personal gain/malicious harm up to 250,000
and/or up to 10 years imprisonment - Primarily complaint - driven
24HIPAA Complaints Office of Civil Rights
- Over 10,000 privacy complaints filed
- Most complaints involve
- Impermissible use or disclosures of PHI
- Absence of adequate safeguards to protect PHI
- Failure to provide patents with access to records
- Disclosing more information than is minimally
necessary - Making disclosures without a valid authorization
when an authorization is required - Source http//www.calhipaa.com
25References Resources
- CMS/OHS HIPAA Information
- http//www.cms.hhs.gov/HIPAAGenInfo/
- Email questions to CMS askhipaa_at_cms.hhs.gov
- CMS HIPAA Hotline 1-866-282-0659, TTY
877-326-1166 - National Provider Identification
http//www.cms.hhs.gov/NationalProvIdentStand - http//www.cms.hhs.gov/NationalProvIdentStand/Dow
nloads/ NPIFactSheet012606.pdf - Phoenix Health Systems
- http//www.hipaaadvisory.com
- Policies
- CAL HIPAA http//www.calhipaa.com
26References Resources
- Privacy Rule (Office for Civil Rights)
- http//www.hhs.gov/ocr/hipaa/
- OCR Guidance (significant aspects of the Privacy
Rule) - http//www.hhs.gov/ocr/hipaa/privacy.html
- Security Rule (CMS)
- http//www.cms.hhs.gov/SecurityStandard
- UGA COE Security
- http//www.coe.uga.edu/security/
- UGA /USG HIPAA
- http//www.infosec.uga.edu/policymanagement/hipaa.
php - http//www.usg.edu/legal/hipaa/policies.phtml
27- Carol Ann Raymond
- Director, UGA Speech and Hearing Clinic
- Department of Communication Sciences and Special
Education - 528 Aderhold Hall, Athens, GA 30602
- 706.542.4559
- raymond1_at_uga.edu