Transporting Protected Health Information: Difference between revisions
(Created page with "Human Resources | Safety/Security | Research Compliance | Compliance | Privacy/Information Security | Business Operations | Intellectual Property <...") |
Mhurlocker (talk | contribs) m (→Definitions:) |
||
(12 intermediate revisions by 2 users not shown) | |||
Line 1: | Line 1: | ||
[[Human Resources]] | <table style="background:#F8FCFF; text-align:center" width="100%" cellspacing="0" cellpadding="0" border="0"> | ||
< | <tr> | ||
[[Identification Card]] | [[Secure Area Card Access | <td style="padding:0.5em; background-color:#e5e5e5; font-size:90%; line-height:0.95em; border:1px solid #A3B1BF; border-bottom:solid 2px #A3B1BF" | ||
width="20">[[Human Resources]]</td> | |||
<td style="border-bottom:2px solid #A3B1BF" width="3"> </td> | |||
<td style="padding:0.5em; background-color:#e5e5e5; font-size:90%; line-height:0.95em; border:1px solid #A3B1BF; border-bottom:solid 2px #A3B1BF" | |||
width="20">[[Safety/Security]] </td> | |||
<td style="border-bottom:2px solid #A3B1BF" width="3"> </td> | |||
<td style="padding:0.5em; background-color:#e5e5e5; font-size:90%; line-height:0.95em; border:1px solid #A3B1BF; border-bottom:solid 2px #A3B1BF" | |||
width="20">[[Research Compliance]] </td> | |||
<td style="border-bottom:2px solid #A3B1BF" width="3"> </td> | |||
<td style="padding:0.5em; background-color:#e5e5e5; font-size:90%; line-height:0.95em; border:1px solid #A3B1BF; border-bottom:solid 2px #A3B1BF" | |||
width="20">[[Compliance]]</td> | |||
<td style="border-bottom:2px solid #A3B1BF" width="3"> </td> | |||
<td style="padding:0.5em; background-color:white; line-height:0.95em; border:solid 2px #A3B1BF; border-bottom:0; font-weight:bold;" width="20">[[Privacy/Information Security]]</td> | |||
<td style="border-bottom:2px solid #A3B1BF" width="3"> </td> | |||
<td style="padding:0.5em; background-color:#e5e5e5; font-size:90%; line-height:0.95em; border:1px solid #A3B1BF; border-bottom:solid 2px #A3B1BF" | |||
width="20">[[Business Operations]]</td> | |||
<td style="border-bottom:2px solid #A3B1BF" width="3"> </td> | |||
<td style="padding:0.5em; background-color:#e5e5e5; font-size:90%; line-height:0.95em; border:1px solid #A3B1BF; border-bottom:solid 2px #A3B1BF" | |||
width="20">[[Intellectual Property]]</td> | |||
<td style="border-bottom:2px solid #A3B1BF" width="3"> </td> | |||
<td style="padding:0.5em; background-color:#e5e5e5; font-size:90%; line-height:0.95em; border:1px solid #A3B1BF; border-bottom:solid 2px #A3B1BF" | |||
width="20">[[Faculty]]</td> | |||
</tr> | |||
</table> | |||
<br /> | |||
[[Identification Card]] | [[Secure Area Card Access]] | [[Privacy/Confidentiality]] | [[Computer Use/Electronic Information]] | [[Retention and Destruction/Disposal of Private and Confidential Information]] | [[Use and Disclosure of Protected Health Information]] | [[Notice of Privacy Practices]] | [[Access to Designated Record Set]] | [[Accounting of PHI Disclosures]] | [[Patient/Consumer Complaints]] | [[Vendors]] | [[Fax Transmissions]] | [[Psychotherapy Notes]] | [[Facility Security]] | [[Conditions of Treatment Form]] | [[Informed Consent for UNMC Media]] | [[Transporting Protected Health Information]] | [[Honest Broker]] | [[Social Security Number]] | [[Third Party Registry]] | [[Information Security Awareness and Training]] | |||
<br /><br /> | <br /><br /> | ||
Policy No.: '''6073'''<br /> | |||
Effective Date: '''01/30/12'''<br /> | |||
Revised Date:<br /> | |||
Reviewed Date: <br /> | |||
<big>'''Transporting Protected Health Information Policy'''</big> | |||
== Policy: == | == Policy: == | ||
All Protected Health Information (PHI) in paper and electronic form must be transported and stored in a secure manner to safeguard it against improper disclosure and/or loss. | All Protected Health Information (PHI) in paper and electronic form must be transported and stored in a secure manner to safeguard it against improper disclosure and/or loss. | ||
Line 9: | Line 39: | ||
== Definitions: == | == Definitions: == | ||
''Transport'' means to physically move PHI (whether on paper, or on mobile digital devices and electronic storage device such as a laptop computer, smartphone, USB/thumb drive or a disk) from one location to another, by any means including by foot, motor vehicle including courier, airplane or other means of transportation. For example: moving a medical record from one clinic to another, from one department to another, from an external research source back to the facility, or from the office to home. | ''Transport'' means to physically move PHI (whether on paper, or on mobile digital devices and electronic storage device such as a laptop computer, smartphone, USB/thumb drive or a disk) from one location to another, by any means including by foot, motor vehicle including courier, airplane or other means of transportation. For example: moving a medical record from one clinic to another, from one department to another, from an external research source back to the facility, or from the office to home. | ||
''Protected health information | <br \><br \>'''Protected Health Information (PHI)''' | ||
Individually identifiable health information including demographic information, collected from an Individual, whether oral or recorded in any medium, that: | |||
* is created or received by UNMC/ACE; and | |||
* relates to the past, present or future physical or mental health or condition of an Individual; the provision of health care to an Individual; or the past, present or future payment for the provision of health care to an Individual and identifies the Individual or with respect to which there is a reasonable basis to believe the information can be used to identify the Individual. | |||
PHI includes genetic information, which includes information about: | |||
* an Individual’s genetic tests; | |||
* the genetic tests of an Individual’s family members; or | |||
* the manifestation of a disease or disorder in such Individual’s family members (i.e., family medical history). | |||
PHI excludes: | |||
* individually identifiable health information of a person who has been deceased for more than fifty (50) years. | |||
* education records covered by the Family Educational Rights and Privacy Act (FERPA); and | |||
* employment records held by UNMC in its role as employer. | |||
== Procedures: == | == Procedures: == | ||
# PHI that is being transported within a facility, such as from one department to another, will be attended or supervised at all times, or otherwise secured to avoid unauthorized access, loss and/or tampering. | # PHI that is being transported within a facility, such as from one department to another, will be attended or supervised at all times, or otherwise secured to avoid unauthorized access, loss and/or tampering. | ||
Line 16: | Line 64: | ||
## should be transported without stops that involve leaving the vehicle unattended if possible. If stops must be made do not leave the PHI in the vehicle. Remove it and secure it so that others who do not have a need to know it cannot access it. | ## should be transported without stops that involve leaving the vehicle unattended if possible. If stops must be made do not leave the PHI in the vehicle. Remove it and secure it so that others who do not have a need to know it cannot access it. | ||
# Additional measures must be taken to secure PHI that is taken home or to another location or accessed remotely via VPN: | # Additional measures must be taken to secure PHI that is taken home or to another location or accessed remotely via VPN: | ||
## Remote access into the organization's computer network via VPN is preferable to taking PHI home. To obtain remote access, complete the | ## Remote access into the organization's computer network via VPN is preferable to taking PHI home. To obtain remote access, complete the [https://net.unmc.edu/netid/accountrequestremote.php form]. | ||
https://net.unmc.edu/netid/accountrequestremote.php | |||
## If PHI is being accessed from or taken home to work during off-hours, employees' manager/director should be notified and approve such work at home off-hours. | ## If PHI is being accessed from or taken home to work during off-hours, employees' manager/director should be notified and approve such work at home off-hours. | ||
## PHI in the home must be secured from access or view by family members and others. Workforce members shall log out of information systems immediately after use and shall secure their login and password so that others cannot use it. | ## PHI in the home must be secured from access or view by family members and others. Workforce members shall log out of information systems immediately after use and shall secure their login and password so that others cannot use it. | ||
# Mobile devices must be password protected and encrypted. For additional information, refer to the [ | # Mobile devices must be password protected and encrypted. For additional information, refer to the [https://info.unmc.edu/its-security/policies/procedures/enduser.html End User Device Procedure] for security of mobile devices such as laptops, USB/thumb drives, etc. | ||
# If PHI is lost, stolen or improperly accessed by others, immediately notify the ITS Help Desk, Privacy Officer or Information Security Officer. Immediately notify UNMC Security and file a police report if PHI is stolen. | # If PHI is lost, stolen or improperly accessed by others, immediately notify the ITS Help Desk, Privacy Officer or Information Security Officer. Immediately notify UNMC Security and file a police report if PHI is stolen. | ||
# Contact the HIPAA Privacy Office for additional guidance. | # Contact the HIPAA Privacy Office for additional guidance. | ||
==Additional Information== | |||
*Contact [mailto:dbishop@unmc.edu Privacy Officer] | |||
*See UNMC Policy #6051, [[Computer Use/Electronic Information | Computer Use and Electronic Information Security Policy]] | |||
*See UNMC's [http://www.unmc.edu/hipaa/ HIPAA] information pages | |||
This page maintained by [mailto:dpanowic@unmc.edu dkp] | This page maintained by [mailto:dpanowic@unmc.edu dkp] |
Latest revision as of 08:28, August 16, 2023
Human Resources | Safety/Security | Research Compliance | Compliance | Privacy/Information Security | Business Operations | Intellectual Property | Faculty |
Identification Card | Secure Area Card Access | Privacy/Confidentiality | Computer Use/Electronic Information | Retention and Destruction/Disposal of Private and Confidential Information | Use and Disclosure of Protected Health Information | Notice of Privacy Practices | Access to Designated Record Set | Accounting of PHI Disclosures | Patient/Consumer Complaints | Vendors | Fax Transmissions | Psychotherapy Notes | Facility Security | Conditions of Treatment Form | Informed Consent for UNMC Media | Transporting Protected Health Information | Honest Broker | Social Security Number | Third Party Registry | Information Security Awareness and Training
Policy No.: 6073
Effective Date: 01/30/12
Revised Date:
Reviewed Date:
Transporting Protected Health Information Policy
Policy:
All Protected Health Information (PHI) in paper and electronic form must be transported and stored in a secure manner to safeguard it against improper disclosure and/or loss. Confidential information will be stored or transported outside secure network servers only as necessary. Whenever possible, workforce members should remotely access PHI via virtual private network (VPN) instead of physically transporting PHI. Only the minimum amount of PHI necessary to accomplish the purpose of the use/disclosure should be transported.
Definitions:
Transport means to physically move PHI (whether on paper, or on mobile digital devices and electronic storage device such as a laptop computer, smartphone, USB/thumb drive or a disk) from one location to another, by any means including by foot, motor vehicle including courier, airplane or other means of transportation. For example: moving a medical record from one clinic to another, from one department to another, from an external research source back to the facility, or from the office to home.
Protected Health Information (PHI)
Individually identifiable health information including demographic information, collected from an Individual, whether oral or recorded in any medium, that:
- is created or received by UNMC/ACE; and
- relates to the past, present or future physical or mental health or condition of an Individual; the provision of health care to an Individual; or the past, present or future payment for the provision of health care to an Individual and identifies the Individual or with respect to which there is a reasonable basis to believe the information can be used to identify the Individual.
PHI includes genetic information, which includes information about:
- an Individual’s genetic tests;
- the genetic tests of an Individual’s family members; or
- the manifestation of a disease or disorder in such Individual’s family members (i.e., family medical history).
PHI excludes:
- individually identifiable health information of a person who has been deceased for more than fifty (50) years.
- education records covered by the Family Educational Rights and Privacy Act (FERPA); and
- employment records held by UNMC in its role as employer.
Procedures:
- PHI that is being transported within a facility, such as from one department to another, will be attended or supervised at all times, or otherwise secured to avoid unauthorized access, loss and/or tampering.
- Additional measures must be taken to secure PHI that is being transported outside of a facility to assure confidentiality and integrity in the event of an accident, theft, or other unforeseen event. PHI that is transported by motor vehicle:
- should be transported in a secure container such as a locked box or briefcase whenever possible; and
- should be transported without stops that involve leaving the vehicle unattended if possible. If stops must be made do not leave the PHI in the vehicle. Remove it and secure it so that others who do not have a need to know it cannot access it.
- Additional measures must be taken to secure PHI that is taken home or to another location or accessed remotely via VPN:
- Remote access into the organization's computer network via VPN is preferable to taking PHI home. To obtain remote access, complete the form.
- If PHI is being accessed from or taken home to work during off-hours, employees' manager/director should be notified and approve such work at home off-hours.
- PHI in the home must be secured from access or view by family members and others. Workforce members shall log out of information systems immediately after use and shall secure their login and password so that others cannot use it.
- Mobile devices must be password protected and encrypted. For additional information, refer to the End User Device Procedure for security of mobile devices such as laptops, USB/thumb drives, etc.
- If PHI is lost, stolen or improperly accessed by others, immediately notify the ITS Help Desk, Privacy Officer or Information Security Officer. Immediately notify UNMC Security and file a police report if PHI is stolen.
- Contact the HIPAA Privacy Office for additional guidance.
Additional Information
- Contact Privacy Officer
- See UNMC Policy #6051, Computer Use and Electronic Information Security Policy
- See UNMC's HIPAA information pages
This page maintained by dkp