hippa security presentation

18

Upload: rebecca-norman

Post on 15-Apr-2017

114 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: HIPPA Security Presentation
Page 2: HIPPA Security Presentation

HIPAA Security

Page 3: HIPPA Security Presentation

 Health Insurance Portability and Accountability Act (HIPAA)-was implemented in the healthcare field in 1996 and has sped the movement to electronic health records, stronger data protection, and better access to patient records.

Page 4: HIPPA Security Presentation

The Security Standards for the Protection of Electronic Protected Health Information (the Security Rule) establish a national set of security standards for protecting certain health information that is held or transferred in electronic form. 

The Security Rule operationalizes the protections contained in the Privacy Rule by

addressing the technical and non-technical safeguards that organizations called covered entities.

In addition, The Office for Civil Rights (OCR) has responsibility for enforcing the Security Rules with voluntary compliance activities and civil money penalties. Click to View Website

to… HIIPA - Security Rule

Page 5: HIPPA Security Presentation

Who must comply? All HIPAA covered entities must comply such as

Healthcare workers, administrative staff, physicians and insurance companies. As entities we must know about administrative, technical and physical safeguards.

Page 6: HIPPA Security Presentation

A major goal of the Security Rule is to protect the privacy of individuals’ health information while allowing covered entities to adopt new technologies to improve the quality and efficiency of patient care.

Page 7: HIPPA Security Presentation

The Security Rule, like all of the Administrative Simplification rules, applies to any healthcare provider who transmits health information in electronic form in connection with a transaction for and has adopted standards under HIPAA (the “covered entities”).

Page 8: HIPPA Security Presentation

General RulesThe Security Rule requires covered entities to maintain reasonable and appropriate administrative, technical, and physical safeguards for protecting e-PHI (Electronic protected health information) .

Specifically, covered entities must:

Click to View website to…. HIPPA – Security

Summary

❖ Ensure the confidentiality, integrity, and availability of all e-PHI they create, receive, maintain or transmit.

❖ Identify and protect against reasonably anticipated threats to the security or integrity of the information.

❖ Protect against reasonably anticipated, impermissible uses or disclosure

❖ Ensure compliance by their workforce.

Page 10: HIPPA Security Presentation

Quiz:

Page 11: HIPPA Security Presentation

What is HIPAA? A. Happily Intoxicating Pleasant Passionate Attitude B. Health Insurance Portability and Accountability Act  C. Hostile Ill-disposed Persistent Pugnacious Attitude

Question 1

Page 12: HIPPA Security Presentation

What is the HIPAA security rule definition? A. HIPAA Security Rule (SR) deals with electronic Health Records B. HIPAA Security Rule (SR) deals with electronic Protected

Health Information  C. HIPAA Security Rule (SR) deals with electronic Medical Records

Question 2

Page 13: HIPPA Security Presentation

What is e-PHI? A. Education at the Public Health Institute B. Electronic protected health information  C. Electric Physical Health Instruments

Question 3:

Page 14: HIPPA Security Presentation

What are the HIPAA Security rule standards?

A. Ensure the confidentiality, integrity, and availability of all electronic protected health information

B. Protect against any reasonably anticipated threats or hazards to the security or integrity of health information and any reasonably anticipated uses or disclosures of health information that are not permitted

C. Ensure compliance

Question 4:

Page 15: HIPPA Security Presentation

5. How would you Implement the HIPAA Security rule standards?

A. One designated employee appointed to set up firewalls and regularly monitor them.

B. Establish a secured Internet accessibility route, one that requires a password to access the internet.

C. Set up Firewalls.

Question 5:

Page 16: HIPPA Security Presentation

6. When was HIPAA implemented in healthcare industry?

A. In 1808 B. In 1996 C. in 1798

Question 6:

Page 17: HIPPA Security Presentation

References:

HHS.gov. (n.d.). Retrieved September 18, 2015, from http://www.hhs.gov/

HIPAA Security Rule. (n.d.). Retrieved September 18, 2015, from http://www.hipaasurvivalguide.com/hipaa-security-rule.php

Page 18: HIPPA Security Presentation

The END!