HIPAA and Harassment Flashcards
(42 cards)
HIPAA
Health Insurance Portability and Accountability Act (US)
PIPEDA
Personal Information Protection and Electronic Documents Act (Canada)
What is the purpose of HIPAA?
- Protect patient’s protected health information
- Giving patient’s appropriate access to their information
- Promoting high quality healthcare
PHI
Protected Health Information
What are the three rules of HIPAA?
- Privacy Rule
- Security Rule
- Breach Notification Rule
What is the purpose of the Privacy Rule?
To assure PHI is protected while allowing the flow of health information needed to provide and promote high quality healthcare.
What are the three major aspects of the Privacy Rule?
- Minimum Necessary Rule
- Access/Use of PHI
- Disclosure of PHI
What is the Minimum Necessary Rule?
A rule that requires you to make reasonable efforts to access, disclose, and request only the minimum amount of PHI needed for the treatment of the patient.
What are login credentials used for?
To create a unique electronic footprint. Every click made is tracked and monitored in the EMR/Speke platforms. You are required to keep your login confidential and you are prohibited to use anyone else’s login credentials.
How can you protect your workstation and keep your device secure?
- Do not share your login information with anyone
- Do not keep passwords written down anywhere
- Do not download or access any apps
- Log out anytime you step away
Access/Use of PHI
You should only access PHI for business-related purposes. This means that you should only access records if a patient has been assigned to you. It is prohibited for you to access your own PHI. It is prohibited for you to access records of family, friends, or coworkers - even if they authorize you to do so.
What is an access audit?
Audits are conducted to provide detailed information about your access to PHI. Audits provide your manager/company with the date and time of you access; each portion of the chart that you accessed; the length of time of your access; modifications you made to the chart; the workstation used to access the chart; and even your IP address disclosing your location when you accessed the chart.
What types of access audits can be conducted to find out if PHI has been accessed illegally?
- Same Last Name Audit
- Same Address Audit
- VIP audit
- Patient Requested Audit
Disclosure of PHI
You are permitted to disclose protected health information only to the minimum extent necessary for the treatment of the patient. Ex. you may share PHI with the treating provider or other members of the patients care team (i.e. nurse, consulting physician).
With whom/where should you NOT disclose PHI?
- Any employee that is NOT on the patient’s care team
- Family
- Friends
- Common areas (hallways/elevators)
Social Media and PHI
Posting or publishing information about a patient on social media or the internet is STRICTLY PROHIBITED.
Photography/Video Recordings and PHI
Company policy STRICTLY PROHIBITS taking photographs and video recordings in the facility.
T/F: If you’re reasonable certain the patient could not be identified, then it’s OK to post a photo of a patient on social media.
FALSE - No details of visits should be released as ANYTHING could tie a patient to a visit!O
Y/N: A fellow scribe says the x-ray for the fracture they just saw is really cool. They offer to pull it up for you to see and so you don’t have to use your login. Is this ok?
NO - This violates the minimum necessary rule because this is not needed for the patient’s care. Also, you are NOT assigned to this patient and have no right to view this information.
When is it okay to document outside of EMR?
- On a company or facility authorized desktop-built notepad on your company or facility device
- On paper provided by the facility in the event of EMR downtime
What are unauthorized forms/applications used for note taking?
- Online notepad
- Google Doc
- Word Doc
Which of the following is ok to use to send PHI?
- Messenger
- Encrypted email or encrypted service
- Text
Encrypted email or encrypted service
What is the purpose of the Security Rule?
To establish a national set of security standards for PHI.
What is access management?
Access management is a company’s way to ensure employees are provided access based on their role in the organization to ensure they are only given the appropriate amount of access to ePHI.