HIPAA and Harassment Flashcards
HIPAA
Health Insurance Portability and Accountability Act (US)
PIPEDA
Personal Information Protection and Electronic Documents Act (Canada)
What is the purpose of HIPAA?
- Protect patient’s protected health information
- Giving patient’s appropriate access to their information
- Promoting high quality healthcare
PHI
Protected Health Information
What are the three rules of HIPAA?
- Privacy Rule
- Security Rule
- Breach Notification Rule
What is the purpose of the Privacy Rule?
To assure PHI is protected while allowing the flow of health information needed to provide and promote high quality healthcare.
What are the three major aspects of the Privacy Rule?
- Minimum Necessary Rule
- Access/Use of PHI
- Disclosure of PHI
What is the Minimum Necessary Rule?
A rule that requires you to make reasonable efforts to access, disclose, and request only the minimum amount of PHI needed for the treatment of the patient.
What are login credentials used for?
To create a unique electronic footprint. Every click made is tracked and monitored in the EMR/Speke platforms. You are required to keep your login confidential and you are prohibited to use anyone else’s login credentials.
How can you protect your workstation and keep your device secure?
- Do not share your login information with anyone
- Do not keep passwords written down anywhere
- Do not download or access any apps
- Log out anytime you step away
Access/Use of PHI
You should only access PHI for business-related purposes. This means that you should only access records if a patient has been assigned to you. It is prohibited for you to access your own PHI. It is prohibited for you to access records of family, friends, or coworkers - even if they authorize you to do so.
What is an access audit?
Audits are conducted to provide detailed information about your access to PHI. Audits provide your manager/company with the date and time of you access; each portion of the chart that you accessed; the length of time of your access; modifications you made to the chart; the workstation used to access the chart; and even your IP address disclosing your location when you accessed the chart.
What types of access audits can be conducted to find out if PHI has been accessed illegally?
- Same Last Name Audit
- Same Address Audit
- VIP audit
- Patient Requested Audit
Disclosure of PHI
You are permitted to disclose protected health information only to the minimum extent necessary for the treatment of the patient. Ex. you may share PHI with the treating provider or other members of the patients care team (i.e. nurse, consulting physician).
With whom/where should you NOT disclose PHI?
- Any employee that is NOT on the patient’s care team
- Family
- Friends
- Common areas (hallways/elevators)
Social Media and PHI
Posting or publishing information about a patient on social media or the internet is STRICTLY PROHIBITED.