SlideShare a Scribd company logo
HIPAA Privacy and Security
Presentation
Lexis Practice Advisor®
LexisNexis, Lexis Practice Advisor and the Knowledge Burst logo are registered trademarks of RELX Inc. © 2018 LexisNexis 1
2
Overview
This training discusses:
• The HIPAA Privacy Rule
• The HIPAA Security Rule
• How to handle and safeguard protected health
information, or PHI
3
What is HIPAA?
HIPAA Training Requirements
HIPAA regulations require a covered entity or business associate
(in short, the group health plan and its vendors) to implement a
security awareness and training program for all members of its
workforce, including management.
This presentation is designed to meet this regulatory training
requirement.
LexisNexis, Lexis Practice Advisor and the Knowledge Burst logo are
registered trademarks of RELX Inc. © 2018 LexisNexis 4
5
Privacy Rule and Security Rule
HIPAA’s Privacy Rule provides the framework for protecting PHI
from unauthorized access and disclosure.
HIPAA’s Security Rule safeguards electronic PHI.
6
The Privacy Rule
7
What is HIPAA’s Privacy Rule?
HIPAA’s Privacy Rule provides the framework for protecting
certain health information of health plan participants
(employees/former employees, their spouses and dependents)
from unauthorized access or disclosure by:
• Covered Entities (group health plans, physicians and
hospitals)
• Their Business Associates (their vendors)
8
What Does the HIPAA Privacy Rule
Require?
To comply with the Privacy Rule, a group health plan (like any
other covered entity) must comply with the following:
• Provide notice of privacy practices.
• Adopt appropriate administrative, technical, and physical safeguards
to protect participant PHI privacy and implement Privacy Rule policies
and procedures.
• Designate a privacy officer.
• Train workforce members on HIPAA compliance.
• Enter into business associate agreements with applicable vendors.
• Grant participants the right to access, amend, and receive an
accounting of their PHI disclosures.
9
What Does the HIPAA Privacy Rule
Require? (continued)
HIPAA protects against unauthorized access and disclosure. Here,
disclosure is defined to mean (1) releasing, (2) transferring, (3) providing
access to, or (4) divulging in any manner information outside the entity
holding the information. 45 C.F.R. § 160.103. When explaining HIPAA,
recognize that:
• Health information held by a Covered Entity is usually protected, subject to
exceptions for processing claims and other administrative necessities
• Health information held by an employer in its role as employer is not protected
• Health information held by an employer that is HIPAA-protected must be handled
confidentially and never used to make employment decisions
• Employers and their employees must act reasonably and within the scope of HIPAA
when handling PHI created or collected by the plan
10
Who is Subject to HIPAA?
• Health plans (like group health plans)
o Excludes self-administered plans with fewer than 50 participants
oExcludes plans offering only certain types of coverage (like limited
scope dental-only or vision-only care)
• Health Care Clearinghouses –and–
• Health Care Providers (physicians, hospitals)
11
Employer Group Health Plan
Covered Entities
A group health plan that is a covered entity may be:
• An insured health plan (and its issuer) –or–
• A self-insured group health plan
12
Who Has the Responsibility?
• Fully insured health plans maintained by an employer without access
to PHI: If an employer sponsors a group health plan that does not create
or receive PHI (other than summary health or enrollment information) the
employer need not comply with the HIPAA Privacy Rule and the HIPAA
Security Rule. However, the insurer is subject to the rules.
• Self-funded and Fully-insured plans health plans having PHI access:
These plans will need to comply with the HIPAA Privacy Rule and the
HIPAA Security Rule, even if the self-funded plan uses a third-party
administrator for all plan administration functions.
13
Who are Business
Associates?
A Covered Entity may need to permit a contractor, subcontractor,
or other outside persons or entities to access PHI to provide
services to the Covered Entity. These services may include the
handling, processing, or reviewing of health claims.
These third parties are the Business Associates of the Covered
Entity.
14
Need for Business Associate
Agreements
Contracts Required: Covered entities are required to obtain
satisfactory assurances from the business associate in the form
of a written contract or other arrangement that the business
associate will appropriately handle and safeguard the covered
entity’s PHI.
15
What Does Protected Health
Information Include?
PHI is individually identifiable health information, including demographic
data, that relates to:
• An individual’s past, present, or future physical or mental health or
condition
• The provision of health care to an individual –or–
• The past, present, or future payment for the provision of health care to
an individual
16
Protected Health Information
Examples
PHI includes:
• Information your doctors, nurses, and other health care providers put in
a participant’s medical record
• Conversations a health plan participant’s doctor has about the
participant’s care or treatment with nurses and others
• Information about a health plan participant’s condition residing in a
health insurer’s (or other covered entity’s) computer system
• Billing information about a participant – and –
• Most other health information about a participant held by the
covered
entity or its business associate
17
What Does PHI Exclude?
PHI does not include individually identifiable health information that is:
• In education records covered by the Family Educational Rights and
Privacy Act
• In records on a student who is 18 years or older, or attending an
institution of post-secondary education, which were made by certain
medical professionals when providing treatment to the student
• In employment records held by a covered entity in its role as
employer
–or–
• Regarding a person who has been deceased for more than 50
years
18
Permitted Uses and Disclosures of PHI
Although HIPAA aims to prevent the unauthorized disclosure of an individual’s PHI, certain
disclosures are permitted, or required, for example, for claims processing and
plan administration.
The following are permitted PHI uses and disclosures:
• Disclosures to the individual of their own PHI
• Uses or disclosures for treatment, payment, or health care operations
• Uses or disclosures incidental to a permitted or required use or disclosure
• Uses or disclosures specifically authorized or consented to by the individual
• Certain disclosures for public purposes (e.g., as required by law, to address
public
health matters, to report on victims of abuse, neglect, or domestic violence,
to
facilitate authorized health oversight activities, for research, to facilitate military
and other specialized government functions, among others)
• Uses or disclosures of limited data sets (PHI that has been stripped of certain
identifying information) for research, public health, or health care operations
activities
• Uses and disclosures related to certain underwriting activities
19
The Privacy Notice
Individuals have a right under HIPAA to receive a written notice
describing:
• The uses and disclosures of their PHI that may be made by a group
health plan or other covered entity
• The individuals’ rights regarding PHI –and–
• The covered entity’s legal duties regarding PHI
20
Contents of Privacy Notice
• Header
• Uses and Disclosures
• Separate statement for certain uses and disclosures
• Statement of the individual’s rights (like an accounting)
• Statement of the covered entity’s duties
• A statement of how to issue a complaint
• Contact information
• An effective date
21
Responsibility for and Delivery of the
Privacy Notice
A Covered Entity is responsible for delivering the notice to participants:
• For self-funded plans, the plan must furnish the notice.
• For fully insured plans:
o Where employer handles PHI. Here, the insurer or HMO must furnish the notice, or
the employer if the plan has access to PHI (other than summary health information
and participation and enrollment data).
o Hands-off plans. Where the employer sponsor of a fully insured plan does not create
or handle PHI, except for summary health information and participation and
enrollment data, the notice obligation falls on the health insurer or the HMO.
22
Renewal of the Privacy Notice
The plan must maintain the current notice and provide it to the
named insured:
• Upon request
• Within 60 days of a material revision –and–
• At least once every three years notifying covered individuals of the
availability of and how to obtain the notice
23
Need for a Privacy Officer
A group health plan must:
• Appoint a privacy official who is responsible for monitoring and
enforcing privacy policies and procedures –and– Designate a contact
person or office to receive complaints under the Privacy Rule
24
Additional HIPAA Administrative
Responsibilities
In addition to establishing HIPAA policies and procedures and safeguarding
PHI, the plan must also satisfy the Privacy Rule by:
• Establishing a complaint procedure. The plan must establish a process for
individuals to make complaints concerning the plan’s privacy policies and
procedures and document all complaints and their disposition.
• Applying sanctions. The plan must apply and document sanctions against
workforce members who fail to comply with its privacy policies and
procedures.
• Mitigating impermissible PHU disclosures. The plan must mitigate any use
or disclosure of PHI in violation of its policies and procedures or the Privacy
Rule.
• Documenting violations. The plan must document any use or disclosure of
PHI in violation of its policies and procedures or the Privacy Rule.
25
HIPAA’s Security Rule
26
What is HIPAA’s Security Rule?
HIPAA’s Security Rule requires covered entities and business associates to
implement basic safeguards to protect electronic PHI from unauthorized:
• Access
• Alteration
• Deletion other than under recordkeeping processes, and
• Transmission
27
Security Rule Standards
The Security Rule sets forth standards for the protection of ePHI
in the following areas:
• Administrative safeguards
• Physical safeguards
• Technical safeguards
• Organizational requirements –and–
• Policies and procedures
28
Apply Reasonable and Appropriate
Measures
Group health plans and other covered entities may use any security
measures that allow them to reasonably and appropriately
implement the standards of the Security Rule.
Consider the following when determining what security measures
are reasonable and appropriate:
• Size, complexity, and capabilities of the plan
• Technical infrastructure, hardware, and software security capabilities of the
plan
• Costs of security measures –and–
• Probability and importance of potential risks to ePHI
29
Required or Addressable Standards
Most of the Security Rule standards have implementation specifications,
which are categorized either as required or addressable.
• Required means a process must be implemented by a covered entity
or business associate.
• Addressable means a covered entity or business associate can make
an assessment on whether to implement or not implement.
30
Security Officer
HIPAA regulations require all Covered Entities to identify a HIPAA
Security Officer who is responsible for the development and
implementation of policies and procedures ensuring the integrity
of electronic PHI (ePHI).
31
Questions

More Related Content

PPTX
The Basics of HIPAA
PPTX
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)
PPTX
presentationsPPT-HIPAA-Privacy-Rule-Training.pptx
DOCX
Chapter 5HIPAA and HITECHLearning ObjectivesUnde
PPTX
HIPAA Training - 2011
PPT
Knowing confidentiality
PPTX
Confidentiality Issues Arising Under the ADA, FMLA, HIPAA
PPTX
Privacy & security training.pptx
The Basics of HIPAA
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)
presentationsPPT-HIPAA-Privacy-Rule-Training.pptx
Chapter 5HIPAA and HITECHLearning ObjectivesUnde
HIPAA Training - 2011
Knowing confidentiality
Confidentiality Issues Arising Under the ADA, FMLA, HIPAA
Privacy & security training.pptx

Similar to HIPAA_privacy_and_security_training_presentation (20)

PPTX
Privacy & security training.pptx
PPT
HIPAA Audio Presentation
POT
Week 1 discussion 2 hipaa and privacy training
PPT
CONFIDENTIALITYANDHIPAA.ppt
KEY
HIPPA Compliance
PPT
PPT
HNI U: HIPAA Essentials
PDF
Hipaa training new_staff_december 2018 - compatibility mode
PPTX
HIPAA Training: Privacy Review and Audit Survival Guide
PPTX
Marc etienne week1 discussion2 presentation
PPTX
HIPAA , REGULATORY AFFAIRS , M.PHARM ...
PPTX
Annual HIPAA Training
PPT
Introduction HIPAA-For Health Care Professionals
PPTX
HIPAA & PHI Training
PPTX
2017 HIPAA Clinical Research Training
PPTX
HIPAA Complaince
PPTX
HIPAA, PHI, & 42 CFR Part 2
PDF
Hipaa basics.pp2
PDF
Protecting Employee Personal Information: Know the Right Thing To Do
PPT
Mha 690 week one discussion ii
Privacy & security training.pptx
HIPAA Audio Presentation
Week 1 discussion 2 hipaa and privacy training
CONFIDENTIALITYANDHIPAA.ppt
HIPPA Compliance
HNI U: HIPAA Essentials
Hipaa training new_staff_december 2018 - compatibility mode
HIPAA Training: Privacy Review and Audit Survival Guide
Marc etienne week1 discussion2 presentation
HIPAA , REGULATORY AFFAIRS , M.PHARM ...
Annual HIPAA Training
Introduction HIPAA-For Health Care Professionals
HIPAA & PHI Training
2017 HIPAA Clinical Research Training
HIPAA Complaince
HIPAA, PHI, & 42 CFR Part 2
Hipaa basics.pp2
Protecting Employee Personal Information: Know the Right Thing To Do
Mha 690 week one discussion ii
Ad

More from Mayank Mathur (19)

PPT
PowerPoint-2b.-HIPAA-Security-Awareness-Training.ppt
PPTX
MPH-Student-Compliance-and-P-S-PPT-6-4-18.pptx
PPT
Accident_Investigation_Case Studies for Students
PPT
Accident_Investigation_Case Studies_Students
PPT
Accident_Cases_Incident Investigation Casestudy
PPT
Accident_Cases_Incident Investigation process
PPTX
HIPAA-COW-Training-Detailed Descriptions
PPTX
2018-HIPAA-Renewal-Training for executives
PPTX
New ISO 27001_2022 standard and the changes
PPTX
HIPAA-Privacy and Security Training Session
PPTX
Statistical Process Control- Advanced Methods
PPT
Statistical Quality Control- Operations management
PDF
ELECTRICAL-SAFETY-PRESENTATION Guarding and Risks
PPTX
Electrical-OSHA Outreach Training for Beginners
PPT
wind energy-fundamentals, Technologies and Economics
PPTX
Wind Turbine Generator-History, status and future
PPTX
The first edition of the AIAG-VDA FMEA.pptx
PPTX
The first edition of the AIAG-VDA FMEA.pptx
PPTX
Failure Mode Effect Analysis a presentation
PowerPoint-2b.-HIPAA-Security-Awareness-Training.ppt
MPH-Student-Compliance-and-P-S-PPT-6-4-18.pptx
Accident_Investigation_Case Studies for Students
Accident_Investigation_Case Studies_Students
Accident_Cases_Incident Investigation Casestudy
Accident_Cases_Incident Investigation process
HIPAA-COW-Training-Detailed Descriptions
2018-HIPAA-Renewal-Training for executives
New ISO 27001_2022 standard and the changes
HIPAA-Privacy and Security Training Session
Statistical Process Control- Advanced Methods
Statistical Quality Control- Operations management
ELECTRICAL-SAFETY-PRESENTATION Guarding and Risks
Electrical-OSHA Outreach Training for Beginners
wind energy-fundamentals, Technologies and Economics
Wind Turbine Generator-History, status and future
The first edition of the AIAG-VDA FMEA.pptx
The first edition of the AIAG-VDA FMEA.pptx
Failure Mode Effect Analysis a presentation
Ad

Recently uploaded (20)

PDF
Design Guidelines and solutions for Plastics parts
PPT
INTRODUCTION -Data Warehousing and Mining-M.Tech- VTU.ppt
PPTX
Module 8- Technological and Communication Skills.pptx
PPT
Total quality management ppt for engineering students
PDF
August -2025_Top10 Read_Articles_ijait.pdf
PPTX
Chemical Technological Processes, Feasibility Study and Chemical Process Indu...
PDF
Level 2 – IBM Data and AI Fundamentals (1)_v1.1.PDF
PPTX
tack Data Structure with Array and Linked List Implementation, Push and Pop O...
PDF
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
PDF
UNIT no 1 INTRODUCTION TO DBMS NOTES.pdf
PDF
III.4.1.2_The_Space_Environment.p pdffdf
PPTX
Graph Data Structures with Types, Traversals, Connectivity, and Real-Life App...
PDF
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
PPTX
Software Engineering and software moduleing
PDF
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
PPTX
Fundamentals of safety and accident prevention -final (1).pptx
PDF
BIO-INSPIRED ARCHITECTURE FOR PARSIMONIOUS CONVERSATIONAL INTELLIGENCE : THE ...
PDF
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
PDF
distributed database system" (DDBS) is often used to refer to both the distri...
PPTX
ASME PCC-02 TRAINING -DESKTOP-NLE5HNP.pptx
Design Guidelines and solutions for Plastics parts
INTRODUCTION -Data Warehousing and Mining-M.Tech- VTU.ppt
Module 8- Technological and Communication Skills.pptx
Total quality management ppt for engineering students
August -2025_Top10 Read_Articles_ijait.pdf
Chemical Technological Processes, Feasibility Study and Chemical Process Indu...
Level 2 – IBM Data and AI Fundamentals (1)_v1.1.PDF
tack Data Structure with Array and Linked List Implementation, Push and Pop O...
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
UNIT no 1 INTRODUCTION TO DBMS NOTES.pdf
III.4.1.2_The_Space_Environment.p pdffdf
Graph Data Structures with Types, Traversals, Connectivity, and Real-Life App...
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
Software Engineering and software moduleing
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
Fundamentals of safety and accident prevention -final (1).pptx
BIO-INSPIRED ARCHITECTURE FOR PARSIMONIOUS CONVERSATIONAL INTELLIGENCE : THE ...
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
distributed database system" (DDBS) is often used to refer to both the distri...
ASME PCC-02 TRAINING -DESKTOP-NLE5HNP.pptx

HIPAA_privacy_and_security_training_presentation

  • 1. HIPAA Privacy and Security Presentation Lexis Practice Advisor® LexisNexis, Lexis Practice Advisor and the Knowledge Burst logo are registered trademarks of RELX Inc. © 2018 LexisNexis 1
  • 2. 2 Overview This training discusses: • The HIPAA Privacy Rule • The HIPAA Security Rule • How to handle and safeguard protected health information, or PHI
  • 4. HIPAA Training Requirements HIPAA regulations require a covered entity or business associate (in short, the group health plan and its vendors) to implement a security awareness and training program for all members of its workforce, including management. This presentation is designed to meet this regulatory training requirement. LexisNexis, Lexis Practice Advisor and the Knowledge Burst logo are registered trademarks of RELX Inc. © 2018 LexisNexis 4
  • 5. 5 Privacy Rule and Security Rule HIPAA’s Privacy Rule provides the framework for protecting PHI from unauthorized access and disclosure. HIPAA’s Security Rule safeguards electronic PHI.
  • 7. 7 What is HIPAA’s Privacy Rule? HIPAA’s Privacy Rule provides the framework for protecting certain health information of health plan participants (employees/former employees, their spouses and dependents) from unauthorized access or disclosure by: • Covered Entities (group health plans, physicians and hospitals) • Their Business Associates (their vendors)
  • 8. 8 What Does the HIPAA Privacy Rule Require? To comply with the Privacy Rule, a group health plan (like any other covered entity) must comply with the following: • Provide notice of privacy practices. • Adopt appropriate administrative, technical, and physical safeguards to protect participant PHI privacy and implement Privacy Rule policies and procedures. • Designate a privacy officer. • Train workforce members on HIPAA compliance. • Enter into business associate agreements with applicable vendors. • Grant participants the right to access, amend, and receive an accounting of their PHI disclosures.
  • 9. 9 What Does the HIPAA Privacy Rule Require? (continued) HIPAA protects against unauthorized access and disclosure. Here, disclosure is defined to mean (1) releasing, (2) transferring, (3) providing access to, or (4) divulging in any manner information outside the entity holding the information. 45 C.F.R. § 160.103. When explaining HIPAA, recognize that: • Health information held by a Covered Entity is usually protected, subject to exceptions for processing claims and other administrative necessities • Health information held by an employer in its role as employer is not protected • Health information held by an employer that is HIPAA-protected must be handled confidentially and never used to make employment decisions • Employers and their employees must act reasonably and within the scope of HIPAA when handling PHI created or collected by the plan
  • 10. 10 Who is Subject to HIPAA? • Health plans (like group health plans) o Excludes self-administered plans with fewer than 50 participants oExcludes plans offering only certain types of coverage (like limited scope dental-only or vision-only care) • Health Care Clearinghouses –and– • Health Care Providers (physicians, hospitals)
  • 11. 11 Employer Group Health Plan Covered Entities A group health plan that is a covered entity may be: • An insured health plan (and its issuer) –or– • A self-insured group health plan
  • 12. 12 Who Has the Responsibility? • Fully insured health plans maintained by an employer without access to PHI: If an employer sponsors a group health plan that does not create or receive PHI (other than summary health or enrollment information) the employer need not comply with the HIPAA Privacy Rule and the HIPAA Security Rule. However, the insurer is subject to the rules. • Self-funded and Fully-insured plans health plans having PHI access: These plans will need to comply with the HIPAA Privacy Rule and the HIPAA Security Rule, even if the self-funded plan uses a third-party administrator for all plan administration functions.
  • 13. 13 Who are Business Associates? A Covered Entity may need to permit a contractor, subcontractor, or other outside persons or entities to access PHI to provide services to the Covered Entity. These services may include the handling, processing, or reviewing of health claims. These third parties are the Business Associates of the Covered Entity.
  • 14. 14 Need for Business Associate Agreements Contracts Required: Covered entities are required to obtain satisfactory assurances from the business associate in the form of a written contract or other arrangement that the business associate will appropriately handle and safeguard the covered entity’s PHI.
  • 15. 15 What Does Protected Health Information Include? PHI is individually identifiable health information, including demographic data, that relates to: • An individual’s past, present, or future physical or mental health or condition • The provision of health care to an individual –or– • The past, present, or future payment for the provision of health care to an individual
  • 16. 16 Protected Health Information Examples PHI includes: • Information your doctors, nurses, and other health care providers put in a participant’s medical record • Conversations a health plan participant’s doctor has about the participant’s care or treatment with nurses and others • Information about a health plan participant’s condition residing in a health insurer’s (or other covered entity’s) computer system • Billing information about a participant – and – • Most other health information about a participant held by the covered entity or its business associate
  • 17. 17 What Does PHI Exclude? PHI does not include individually identifiable health information that is: • In education records covered by the Family Educational Rights and Privacy Act • In records on a student who is 18 years or older, or attending an institution of post-secondary education, which were made by certain medical professionals when providing treatment to the student • In employment records held by a covered entity in its role as employer –or– • Regarding a person who has been deceased for more than 50 years
  • 18. 18 Permitted Uses and Disclosures of PHI Although HIPAA aims to prevent the unauthorized disclosure of an individual’s PHI, certain disclosures are permitted, or required, for example, for claims processing and plan administration. The following are permitted PHI uses and disclosures: • Disclosures to the individual of their own PHI • Uses or disclosures for treatment, payment, or health care operations • Uses or disclosures incidental to a permitted or required use or disclosure • Uses or disclosures specifically authorized or consented to by the individual • Certain disclosures for public purposes (e.g., as required by law, to address public health matters, to report on victims of abuse, neglect, or domestic violence, to facilitate authorized health oversight activities, for research, to facilitate military and other specialized government functions, among others) • Uses or disclosures of limited data sets (PHI that has been stripped of certain identifying information) for research, public health, or health care operations activities • Uses and disclosures related to certain underwriting activities
  • 19. 19 The Privacy Notice Individuals have a right under HIPAA to receive a written notice describing: • The uses and disclosures of their PHI that may be made by a group health plan or other covered entity • The individuals’ rights regarding PHI –and– • The covered entity’s legal duties regarding PHI
  • 20. 20 Contents of Privacy Notice • Header • Uses and Disclosures • Separate statement for certain uses and disclosures • Statement of the individual’s rights (like an accounting) • Statement of the covered entity’s duties • A statement of how to issue a complaint • Contact information • An effective date
  • 21. 21 Responsibility for and Delivery of the Privacy Notice A Covered Entity is responsible for delivering the notice to participants: • For self-funded plans, the plan must furnish the notice. • For fully insured plans: o Where employer handles PHI. Here, the insurer or HMO must furnish the notice, or the employer if the plan has access to PHI (other than summary health information and participation and enrollment data). o Hands-off plans. Where the employer sponsor of a fully insured plan does not create or handle PHI, except for summary health information and participation and enrollment data, the notice obligation falls on the health insurer or the HMO.
  • 22. 22 Renewal of the Privacy Notice The plan must maintain the current notice and provide it to the named insured: • Upon request • Within 60 days of a material revision –and– • At least once every three years notifying covered individuals of the availability of and how to obtain the notice
  • 23. 23 Need for a Privacy Officer A group health plan must: • Appoint a privacy official who is responsible for monitoring and enforcing privacy policies and procedures –and– Designate a contact person or office to receive complaints under the Privacy Rule
  • 24. 24 Additional HIPAA Administrative Responsibilities In addition to establishing HIPAA policies and procedures and safeguarding PHI, the plan must also satisfy the Privacy Rule by: • Establishing a complaint procedure. The plan must establish a process for individuals to make complaints concerning the plan’s privacy policies and procedures and document all complaints and their disposition. • Applying sanctions. The plan must apply and document sanctions against workforce members who fail to comply with its privacy policies and procedures. • Mitigating impermissible PHU disclosures. The plan must mitigate any use or disclosure of PHI in violation of its policies and procedures or the Privacy Rule. • Documenting violations. The plan must document any use or disclosure of PHI in violation of its policies and procedures or the Privacy Rule.
  • 26. 26 What is HIPAA’s Security Rule? HIPAA’s Security Rule requires covered entities and business associates to implement basic safeguards to protect electronic PHI from unauthorized: • Access • Alteration • Deletion other than under recordkeeping processes, and • Transmission
  • 27. 27 Security Rule Standards The Security Rule sets forth standards for the protection of ePHI in the following areas: • Administrative safeguards • Physical safeguards • Technical safeguards • Organizational requirements –and– • Policies and procedures
  • 28. 28 Apply Reasonable and Appropriate Measures Group health plans and other covered entities may use any security measures that allow them to reasonably and appropriately implement the standards of the Security Rule. Consider the following when determining what security measures are reasonable and appropriate: • Size, complexity, and capabilities of the plan • Technical infrastructure, hardware, and software security capabilities of the plan • Costs of security measures –and– • Probability and importance of potential risks to ePHI
  • 29. 29 Required or Addressable Standards Most of the Security Rule standards have implementation specifications, which are categorized either as required or addressable. • Required means a process must be implemented by a covered entity or business associate. • Addressable means a covered entity or business associate can make an assessment on whether to implement or not implement.
  • 30. 30 Security Officer HIPAA regulations require all Covered Entities to identify a HIPAA Security Officer who is responsible for the development and implementation of policies and procedures ensuring the integrity of electronic PHI (ePHI).