书签 分享 收藏 举报 版权申诉 / 70
上传文档赚钱

类型HPIAA法案介绍.pptx

  • 上传人(卖家):无敌的果实
  • 文档编号:2535914
  • 上传时间:2022-05-01
  • 格式:PPTX
  • 页数:70
  • 大小:6.22MB
  • 【下载声明】
    1. 本站全部试题类文档,若标题没写含答案,则无答案;标题注明含答案的文档,主观题也可能无答案。请谨慎下单,一旦售出,不予退换。
    2. 本站全部PPT文档均不含视频和音频,PPT中出现的音频或视频标识(或文字)仅表示流程,实际无音频或视频文件。请谨慎下单,一旦售出,不予退换。
    3. 本页资料《HPIAA法案介绍.pptx》由用户(无敌的果实)主动上传,其收益全归该用户。163文库仅提供信息存储空间,仅对该用户上传内容的表现方式做保护处理,对上传内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知163文库(点击联系客服),我们立即给予删除!
    4. 请根据预览情况,自愿下载本文。本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
    5. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007及以上版本和PDF阅读器,压缩文件请下载最新的WinRAR软件解压。
    配套讲稿:

    如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。

    特殊限制:

    部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。

    关 键  词:
    HPIAA 法案 介绍
    资源描述:

    1、HIPAA法案介绍Homeland Former Vice President Dick Cheney came clean in an interview to CBS 60Minutes, revealing that when he had a device implanted to regulate his heartbeatin 2007, he had his doctors disable its wireless capabilities to prevent against apossible assassination attempt. The agency said in

    2、 a statementthat there was no cause foralarm for the nearly 3 millionAmericans with pacemakers.Cyber Attacks and SecurityFBI Warns Health Care Sector Is More Vulnerable to Cyber attacks Anthem Cyber Attack: 80 Million Personal Records Burglarized,2015.2.4 Cyberattack exposes data of 11 million Preme

    3、ra Blue Cross members 2015.3.18 Breaches Affecting 500 or More Individuals (10/21/2009,1562)https:/ocrportal.hhs.gov/ocr/breach/breach_report.jsf 在信息技术深入广泛应用环境下医疗卫生数据安全的政策研究 医疗机构临床数据安全管控框架研究Rise of Data Analytics HeightensNeed for PHI Security2013 significantly changed the context of the healthcare

    4、security and privacyconversation. From the Snowden NSA revelations, to HIPAA Omnibus rule,changes in breach characteristics, to connected devices, mhealth, IoT andincreasing use of cloud and corporate BYOD policies, one thing is clear: securityby obscurity equals no security at all. The burden of pr

    5、otecting PHI is now spreadacross all data holders, patients, providers and payers alike. Outlined below aresome of the unique security issues that will need addressing as healthcaretechnology moves into a data analytics mindset.Breach Characteristics: More than 7 million patient records were exposed

    6、 in 2013alone, marking a perceived 138% increase from reported 2012 healthcare databreaches.Federal Laws,Regulations and Policiesin USA The Computer Security Act of 1987 (PL 100-235) The Privacy Act of 1974 (PL 93-579) The Freedom of Information Act (PL 90-23) The Computer Fraud and Abuse Act of 198

    7、6 (PL 99-474) The Copyright Act of 1976 (PL 94-553) OMB Circular A-130, Appendix III, Revised Health Insurance Portability and Accountability Act of 1996 (PL 104-191) Presidential Decision Directive 63 Critical Infrastructure ProtectionThe ThreeHIPAA-HISTORYHIPAA of 1996 In August 1996, President Cl

    8、inton signed into law the Public Law 104-91,Health Insurance Portability and Accountability Act (HIPAA). The Actincluded provisions for health insurance portability, fraud and abuse control, taxrelated provisions, group health plan requirements, revenue offset provisions,and administrative simplific

    9、ation requirements. Purpose: To improve the portability of health insurance coverage; combatwaste, fraud and abuse; and simplify health care administration. The HIPAA Privacy Rule institutes business processes to protect the use anddisclosure of protected health information (PHI). The compliance dat

    10、e for the HIPAA Privacy rule was April 14, 2003.HIPAA Titles OverviewHIPAA Titles OverviewARRA HITECH - MUFrom HIPAA to HIPAA Omnibus Rule The way we share and access information has changeddrastically since it was established in 1996. The recent changes are meant to STRENGTHEN the privacy andsecuri

    11、ty protections mandated by HIPAA. The rule went into effect March 26, 2013 and has a MANDATORYcompliance date of Sept. 23, 2013.Major Changes Increased Business Associate liability Updates data security guidelines. Increases penalties for violators. Enhanced breach notification requirements.(Securit

    12、y breaches must be reported to the Office for Civil Rights.) Extension of GINA to all plans subject to HIPAA (GI is HI)Enforcement Regulated by Health and Human Service (HHS),Office for CivilRights(OCR) Audits start September 23,2013 ASET(Administrative Simplification Enforcement Tool)Key Terms and

    13、DefinitionsDefinition - Privacy The desire of a person to control the disclosure of personal health informationDefinition - Confidentiality The property that data or information is not made available or disclosed tounauthorized persons or processes.Must protect against unauthorized:-Access-Uses-Disc

    14、losuresKey Terms and DefinitionsDefinition - Availability The property that data or information is accessible and usable upon demand by anauthorized person.-Must provide for ready availability to authorized personnel-Must guard against threats and hazards that may deny access to data or render theda

    15、ta unavailable when needed.-Must provide appropriate backup in the event of a threat, hazard, or natural disaster-Must provide appropriate disaster recovery and business continuity plans fordepartmental operations involving ePHI.Key Terms and DefinitionsDefinition - Security Protection of privacy an

    16、d confidentiality through policies, procedures andsafeguards.Definition Safety (Patient Safety)Patient safety is a new healthcare discipline that emphasizes the reporting,analysis, and prevention of medical error that often leads to adverse healthcareevents.Key Terms and DefinitionsDefinition - Vuln

    17、erability Vulnerability is defined in NIST Special Publication (SP) 800-30 as “a flawor weakness in system security procedures, design, implementation, or internalcontrols that could be exercised (accidentally triggered or intentionallyexploited) and result in a security breach or a violation of the

    18、 systemssecurity policy.” Vulnerabilities, whether accidentally triggered or intentionally exploited,could potentially result in a security incident, such as inappropriate accessto or disclosure of e- PHI. Vulnerabilities may be grouped into two generalcategories, technical and non- technical. Non-t

    19、echnical vulnerabilities mayinclude ineffective or non-existent policies, procedures, standards orguidelines. Technical vulnerabilities may include: holes, flaws or weaknessesin the development of information systems; or incorrectly implemented and/orconfigured information systems.Key Terms and Defi

    20、nitionsDefinition ThreatAn adapted definition of threat, from NIST SP 800-30, is “the potential for a person orthing to exercise (accidentally trigger or intentionally exploit) a specific vulnerability.”There are several types of threats that may occur within an information system or operatingenviro

    21、nment. Threats may be grouped into general categories such as natural, human, andenvironmental. Examples of common threats in each of these general categories include: Natural threats such as floods, earthquakes, tornadoes, and landslides. Human threats are enabled or caused by humans and may includ

    22、e intentional (e.g., networkand computer based attacks, malicious software upload, and unauthorized access to e-PHI) orunintentional (e.g., inadvertent data entry or deletion and inaccurate data entry)actions. Environmental threats such as power failures, pollution, chemicals, and liquid leakage.Key

    23、 Terms and DefinitionsDefinition RiskAn adapted definition of risk, from NIST SP 800-30, is:“The net mission impact considering (1) the probability that a particular threat will exercise(accidentally trigger or intentionally exploit) a particular vulnerability and (2) the resultingimpact if this sho

    24、uld occur . . . . Risks arise from legal liability or mission loss due to1. Unauthorized (malicious or accidental) disclosure, modification, or destruction of information2. Unintentional errors and omissions3. IT disruptions due to natural or man- made disasters4. Failure to exercise due care and di

    25、ligence in the implementation and operation of the IT system.”Risk can be understood as a function of 1) the likelihood of a given threat triggering or exploitinga particular vulnerability, and 2) the resulting impact on the organization. This means that risk isnot a single factor or event, but rath

    26、er it is a combination of factors or events (threats andvulnerabilities) that, if they occur, may have an adverse impact on the organization.Covered EntitiesCovered EntitiesCovered EntitiesEnforcement Regulated by Health and Human Service(HHS),Office for Civil Rights(OCR) Audits start September 23,2

    27、013 ASET(Administrative SimplificationEnforcement Tool)What is protected?PHIWhat is protected?PHIWhat Information Must Be Protected? You must protect an individuals PHI(Protected Health Information)which iscollected or created as a consequence of ahealth care provision.Name Postal addressAll element

    28、s of dates except year Telephone number Fax numberEmail address URL address IP address Social security number Account numbers License numbers Medical record numberHealth plan beneficiary # Device identifiers and their serial numbers Vehicle identifiers and serial number Biometric identifiers Any hea

    29、lth information with identifiers (18Identifiers defined by HIPAA at right) is PHI.PHI Includes: Verbal information Information on paper(finger and voice prints) Recorded information Electronic information (faxes, e-mails, etc.) Full face photos and other comparableimages Any other unique identifying

    30、 number, code,or characteristicWhat is protected?e-PHIDe-Identified Information PHI is de-identified by removing, coding, encryption,or otherwise eliminating or concealing(隐藏)individually identifiable information Regulations do not apply to de-identified information- May be used or disclosed freely

    31、as long as the code to re-identify the information is not accessiblePatient Rights under HIPAAPatients have these basic rights under HIPAA: Right to Request Amendment to Medical Record Right to Access PHI Patients can Request a Summary of Disclosures of their PHI during the past sixyears Right to Co

    32、nfidential and Alternative Communications Right to Further Restrict Disclosure of PHI Right to Complain about Privacy and Security PracticesHIPAA Patient Consent FormNotice of Privacy PracticesHIPAA(Omnibus Rule) & MUWhy Does Privacy & Security Matter? HIPAA Privacy and Security Rules Build Patients

    33、 trust. Patients are unlikely to share sensitive information unless they trust that you willhonor their confidentiality. Core requirement for the CMS Meaningful Use / Medicare and Medicaid EHRs incentive Programs.Ensuring privacy and security of health information, including information in EHR is th

    34、e key componentto building the trust required to realize the potential benefits of electronic health informationexchange. Your practice, not your EHR vendor, is responsible for taking the steps needed to protect theconfidentiality, integrity, and availability of health information in your EHR. The p

    35、reservation of confidentiality assists research which in turn assists patients.HIPAA(Omnibus Rule) & GINAWorried About HIPAA? Dont Forget GINA In addition to HIPAA, the Genetic Information Nondiscrimination Act (GINA) may become a factor inhow we handle EMR data security. President Bush Signs Geneti

    36、c Information Nondiscrimination Act of 2008 Regulations have already been promulgated which restrict access to occupational health information. GINA is primarily aimed at the workplace, as its purpose is to bar an employer from requesting orobtaining an individuals genetic information at any stage o

    37、f employment. Since GINA construes this to mean not only the results of genetic tests, but anything related to familymedical history, even providers who dont do occupational medicine may have some serious datasecurity issues to consider.Administrative SimplificationPrivacy RuleThe HIPAA Privacy Rule

    38、 provides federal protections for individually identifiable healthinformation held by covered entities and their business associates and gives patients an array ofrights with respect to that information.At the same time, the Privacy Rule is balanced so that it permits the disclosure of healthinforma

    39、tion needed for patient care and other important purposes. Key Points: Establishes standards on the use and disclosure of PHI (Require “minimumnecessary” use and disclosure); Provides patients with access to their own medical records; Require providers to obtain a signed consent form in order to use

    40、 and disclose PHIfor activities related to treatment, payment and health care operations (TPO). Need separate authorization to use or disclose PHI for any other purposes (e.g.,marketing).Privacy Rule Direct access to patient information shall only bepermitted to those employees who have a “needto kn

    41、ow” to perform their job functionsPHI can be used or disclosed for: Treatment, payment, and healthcare operations With authorization/agreement from patient For disclosure to patientPrivacy RuleThe “need to know” is defined as MinimumNecessary Information.“Need to Know” is when you need information t

    42、o:1. Document the patients treatment2. Facilitate communication between physicians and otherprofessionals contributing to the patients care3. Provide continuity of patient care4. Provide a basis for review, study, and evaluation of patient careprocesses5. Provide clinical data for approved research,

    43、 study, and education;and for legitimate business purposes.Privacy RuleWhat are legitimate business purposes?Legitimate business purposes include provision of:1. Statistical data for decision making and planning2. Data to third parties as specified by law (e.g. communicablediseases, coroners cases(验

    44、尸), burns, cancer registryreporting, etc.)3. Documentation for billing and insurance claims processing4. Appropriate access to medical records and data as requiredfor licensing and accreditation purposes.Security RuleSecurity refers to a covered entitys specific efforts to protect the integrity of t

    45、hehealth information (especially e-PHI) it holds and prevent unauthorized breaches ofprivacy such as might occur if data are lost or destroyed by accident, stolen by intentor sent to the wrong person in error.The HIPAA Security Rule requires three kinds of safeguards: administrative,physical, and te

    46、chnical: Administrative (e.g., policies and procedures covering access to information,user IDs and passwords, or punishments for violations of these) Physical (e.g., locking rooms and storage facilities) Technical (e.g., encryption of electronic data and use of digital signatures toauthenticate user

    47、s logging into a computer system)Administrative SafeguardsAdministrative safeguardsThese safeguards establish standards and specifications for your healthinformation security program that include the following: Security management processes to identify and analyze risks to e-PHI andimplementing secu

    48、rity measures to reduce risks Staff training to ensure knowledge of and compliance with your policies andprocedures Information access management to limit access to electronic health records toprotect health information, including the information in EHRs Contingency plan to respond to emergencies or

    49、 restore lost dataAdministrative SafeguardsAdministrative SafeguardsAdministrative SafeguardsPhysical SafeguardsThese safeguards control physical access to your office and computer systems.Examples of required physical safeguards include: Facility access controls, such as locks and alarms, to ensure

    50、 only authorizedpersonnel have access into facilities that house systems and data(Data Center) Workstation security measures, such as cable locks and computer monitorprivacy filters(隐私过滤防窥屏 ), to guard against theft and restrict access toauthorized users Workstation use policies to ensure proper acc

    展开阅读全文
    提示  163文库所有资源均是用户自行上传分享,仅供网友学习交流,未经上传用户书面授权,请勿作他用。
    关于本文
    本文标题:HPIAA法案介绍.pptx
    链接地址:https://www.163wenku.com/p-2535914.html

    Copyright@ 2017-2037 Www.163WenKu.Com  网站版权所有  |  资源地图   
    IPC备案号:蜀ICP备2021032737号  | 川公网安备 51099002000191号


    侵权投诉QQ:3464097650  资料上传QQ:3464097650
       


    【声明】本站为“文档C2C交易模式”,即用户上传的文档直接卖给(下载)用户,本站只是网络空间服务平台,本站所有原创文档下载所得归上传人所有,如您发现上传作品侵犯了您的版权,请立刻联系我们并提供证据,我们将在3个工作日内予以改正。

    163文库