De-Identification of PHI under HIPAA
Training
Online
*Indicative price
Original amount in USD:
$ 139
Description
-
Type
Training
-
Level
Intermediate
-
Methodology
Online
-
Duration
1 Day
Today health information needs to be shared more than ever, but how can that be done most easily within the limits of HIPAA? One way is to de-identify the information.
Once PHI has been de-identified, it is no longer protected under HIPAA and may be shared freely without limitation. The problem is that it is not easy to truly de-identify information and if it is not done correctly, the sharing of the information may be considered a breach that requires reporting to HHS and the potential for penalties and corrective action plans.
Reviews
Subjects
- Hipaa
- Hipaa texting
- Hipaa rules
- HIPAA Email
- HIPAA regulations
- Hipaa risk analysis
- HIPAA Text Messaging
- Healthcare
- Healthcare Law
- Healthcare Billing
Teachers and trainers (1)
Jim Sheldon Dean
Director of Compliance Services, Lewis Creek Systems, LLC
Jim Sheldon-Dean is the founder and director of compliance services at Lewis Creek Systems, LLC, a Vermont-based consulting firm founded in 1982, providing information privacy and security regulatory compliance services to a wide variety of health care entities.
Course programme
Overview:
Today health information needs to be shared more than ever, but how can that be done most easily within the limits of HIPAA? One way is to de-identify the information.
Once PHI has been de-identified, it is no longer protected under HIPAA and may be shared freely without limitation. The problem is that it is not easy to truly de-identify information and if it is not done correctly, the sharing of the information may be considered a breach that requires reporting to HHS and the potential for penalties and corrective action plans.
De-identification of Protected Health Information requires removing all eighteen of the listed identifiers, or anything else that might be used to identify the individual about whom the information exists. Or you can have an expert certify that the information is not identifiable. But neither of these is foolproof. You need to look more closely to be sure the data cannot be identified. You may wish to communicate with another provider, or with an agency that is not covered under HIPAA, using plain e-mail, but you want to strip out the name and use a code that both parties understand. Is that sufficient to allow the use of plain e-mail? You need to run though some examples and some tests to make sure before you go ahead.
https://www.mentorhealthlearning.com/webinar/de-identification-of-phi-under-hipaa---follow-the-guidance-to-avoid-penalties--802112LIVE
De-Identification of PHI under HIPAA
*Indicative price
Original amount in USD:
$ 139