Difference between revisions of "Protected Health Information (PHI)"

From Clinfowiki
Jump to: navigation, search
(Examples of PHI Identifiers)
(References)
Line 111: Line 111:
 
== References ==
 
== References ==
  
# http://cphs.berkeley.edu/hipaa/hipaa18.html
 
 
# Hartley, C. & Jones, E.  (2004) HIPAA Plain and Simple, a compliance guide for healthcare professionals. AMA Press, Chicago, IL
 
# Hartley, C. & Jones, E.  (2004) HIPAA Plain and Simple, a compliance guide for healthcare professionals. AMA Press, Chicago, IL
 
# Healthcare compliance-an introductory guide for employees. Johnson and Johnson. Retrieved from: http://www.shareholder.com/Shared/DynamicDoc/jnj/1293/6210%20Overview%20Guide_WEB_single_pg.pdf
 
# Healthcare compliance-an introductory guide for employees. Johnson and Johnson. Retrieved from: http://www.shareholder.com/Shared/DynamicDoc/jnj/1293/6210%20Overview%20Guide_WEB_single_pg.pdf
Line 117: Line 116:
 
#http://www.hhs.gov/ocr/privacy/hipaa/understanding/coveredentities/index.html
 
#http://www.hhs.gov/ocr/privacy/hipaa/understanding/coveredentities/index.html
 
#http://www.irb.emory.edu/researchers/formstools/docs/other/phi_identifiers.pdf
 
#http://www.irb.emory.edu/researchers/formstools/docs/other/phi_identifiers.pdf
 +
# http://cphs.berkeley.edu/hipaa/hipaa18.html
 +
  
 
Submitted by Sherry Dexheimer
 
Submitted by Sherry Dexheimer

Revision as of 02:55, 13 November 2013

Protected health information (PHI) is individually identifiable health information. PHI is demographic data that relates to individual’s physical or mental health, provision of health care, payment for the provision of health care, and common identifiers such as name, address, phone numbers, birth date, and Social Security Number. All protected health information must comply with Health Insurance Portability and Accountability Act (HIPAA) standards.There is also electronic protected health information (ePHI). The ePHI is PHI that is sent or transmitted electronically.

Introduction

PHI and ePHI is found in many locations in paper medical records and the electronic medical record. Data can be found in medical records, billing records, insurance/benefit enrollment and payment, claims payment, and case management records.

Security and privacy go hand in hand. Security is about controlling access to electronic PHI, while privacy is about controlling how electronic, oral, and written PHI is used and disclosed. Covered entities need to make it a top priority to establish and implement policies and procedures to protect patient information (1).

Covered Entities

Covered entities covered under the Privacy Rule include (4):

1) Health Plans

2) Health Care Providers

3) Health Care Clearinghouses

Examples of PHI Identifiers

Examples Include (5)(6):

• Names

• Addresses: All geographical subdivisions smaller than a State, including street address, city, county, precinct, zip code, and their equivalent geocodes, except for the initial three digits of a zip code, if according to the current publicly available data from the Bureau of the Census: (1) The geographic unit formed by combining all zip codes with the same three initial digits contains more than 20,000 people; and (2) The initial three digits of a zip code for all such geographic units containing 20,000 or fewer people is changed to 000.

• Dates: All elements of dates (except year) for dates directly related to an individual, including birth date, admission date, discharge date, date of death; and all ages over 89 and all elements of dates (including year) indicative of such age, except that such ages and elements may be aggregated into a single category of age 90 or older

• Phone numbers

• Fax numbers

• E-mail address

• Social Security Numbers

• Medical records numbers

• Account numbers

• Health plan beneficiary number

• Certification/license number

• Vehicle identifiers and serial numbers, including license plate numbers

• Device identifiers and serial numbers

• Web Universal Resource Locators (URLs)

• Internet Protocol (IP) address numbers

• Names of relatives

• Biometric identifiers, including finger and voice prints

• Full face photographic images and any comparable images

• Any other unique identifying number, characteristic, or code (note this does not mean the unique code assigned by the investigator to code the data)

Administrative Safeguards

The Privacy Rule requires covered entities to perform administrative tasks to protect privacy of health information. Scalable confidentiality and security procedures, designated security officer, sanctions for violations, and signed statement by all employees regarding confidentiality of data (1).

Compliance guidelines

Organizations compliance guidelines, like law and industry codes reflect and are intended to serve patients by safeguarding medical information, enabling us to advance patient care while protecting patient privacy.

Fundamental elements to an effective compliance program:

  • Written policies and procedures for compliance
  • A designated compliance officer and committee
  • Effective training and education for employees
  • Effective lines of communication
  • Internal monitoring and auditing procedures
  • Enforcement of standards through disciplinary guidelines
  • Prompt responses to detected problems and implementation of corrective action (2)

Technical Safeguards

Technical safegyards include:

  • unique IDs
  • encrypted password storage system
  • disallowing weak passwords
  • automatic time logoff
  • system enforced password changes
  • firewall
  • virus checking
  • disallow sharing of passwords

Protecting Electronic Data

Confidential information stored on a portable electronic device such as a laptop, USB drive, CD, DVD or PDA should be encrypted to ensure data cannot be retrieved by an unauthorized person if lost or stolen.

Protecting Paper Medical Records

Paper medical records containing PHI should be kept in a locked and secure location. Only authorized or designated people should have access to any paper records containing PHI.

Recycling

All covered entities are required to properly dispose of PHI. A reliable way for most organizations is to hire a shredding company that will destroy all PHI off site in a manner that is consistent with HIPAA Privacy and Security rules and regulations. Placing protected information in an unsecured garbage can (including blue recycle cans) is not an acceptable method of disposal for documents that contain private information. Such information should be secured until shredded or properly destroyed.

Privacy and Security violation of PHI

If PHI is not protected properly by all covered entities there are severe penalties, fines and corrective action that may take place. Anyone can file a compliant if they feel that their privacy has been violated. More information is found at [1]


Summary

Healthcare providers in all settings implement compliance programs to protect patient privacy and to ensure ethical business practices. This is necessary due to the increased severity of penalties established by the Health Insurance Portability and Accountability Act (HIPAA) of 1996 and the Balanced Budget Act of 1997 (public law 105-33). By ensuring ethical business practices through compliance programs, healthcare providers reduce their risk of criminal and civil litigation in regards to privacy and security.(3)

References

  1. Hartley, C. & Jones, E. (2004) HIPAA Plain and Simple, a compliance guide for healthcare professionals. AMA Press, Chicago, IL
  2. Healthcare compliance-an introductory guide for employees. Johnson and Johnson. Retrieved from: http://www.shareholder.com/Shared/DynamicDoc/jnj/1293/6210%20Overview%20Guide_WEB_single_pg.pdf
  3. AHIMA (2011). Healthcare compliance. Retrieved from: http://www.ahima.org/resources/compliance.aspx
  4. http://www.hhs.gov/ocr/privacy/hipaa/understanding/coveredentities/index.html
  5. http://www.irb.emory.edu/researchers/formstools/docs/other/phi_identifiers.pdf
  6. http://cphs.berkeley.edu/hipaa/hipaa18.html


Submitted by Sherry Dexheimer

Submitted by Molly Kneen