De-Identification of PHI under HIPAA

Training

Online

£ 111.11 VAT inc.

*Indicative price

Original amount in USD:

$ 139

Description

  • Type

    Training

  • Level

    Intermediate

  • Methodology

    Online

  • Duration

    1 Day

Today health information needs to be shared more than ever, but how can that be done most easily within the limits of HIPAA? One way is to de-identify the information.

Once PHI has been de-identified, it is no longer protected under HIPAA and may be shared freely without limitation. The problem is that it is not easy to truly de-identify information and if it is not done correctly, the sharing of the information may be considered a breach that requires reporting to HHS and the potential for penalties and corrective action plans.

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

Subjects

  • Hipaa
  • Hipaa texting
  • Hipaa rules
  • HIPAA Email
  • HIPAA regulations
  • Hipaa risk analysis
  • HIPAA Text Messaging
  • Healthcare
  • Healthcare Law
  • Healthcare Billing

Teachers and trainers (1)

 Jim  Sheldon Dean

Jim Sheldon Dean

Director of Compliance Services, Lewis Creek Systems, LLC

Jim Sheldon-Dean is the founder and director of compliance services at Lewis Creek Systems, LLC, a Vermont-based consulting firm founded in 1982, providing information privacy and security regulatory compliance services to a wide variety of health care entities.

Course programme

Overview:

Today health information needs to be shared more than ever, but how can that be done most easily within the limits of HIPAA? One way is to de-identify the information.

Once PHI has been de-identified, it is no longer protected under HIPAA and may be shared freely without limitation. The problem is that it is not easy to truly de-identify information and if it is not done correctly, the sharing of the information may be considered a breach that requires reporting to HHS and the potential for penalties and corrective action plans.

De-identification of Protected Health Information requires removing all eighteen of the listed identifiers, or anything else that might be used to identify the individual about whom the information exists. Or you can have an expert certify that the information is not identifiable. But neither of these is foolproof. You need to look more closely to be sure the data cannot be identified. You may wish to communicate with another provider, or with an agency that is not covered under HIPAA, using plain e-mail, but you want to strip out the name and use a code that both parties understand. Is that sufficient to allow the use of plain e-mail? You need to run though some examples and some tests to make sure before you go ahead.

https://www.mentorhealthlearning.com/webinar/de-identification-of-phi-under-hipaa---follow-the-guidance-to-avoid-penalties--802112LIVE

De-Identification of PHI under HIPAA

£ 111.11 VAT inc.

*Indicative price

Original amount in USD:

$ 139