De-Identification of PHI under HIPAA - Follow the Guidance to Avoid Penalties

Speaker

Instructor: Jim Sheldon-Dean
Product ID: 706865

Location
  • 8
  • February 2023
    Wednesday
  • 10:00 AM PST | 01:00 PM EST
    Duration: 90 Min
This session will review guidance from the HHS Office for Civil Rights (OCR) and from the National Institute of Standards and Technology (NIST) about how to properly de-identify health information. The various needs for de-identified information will be discussed and typical questions covered in the guidance will be discussed, in order to provide a sound, defensible basis for an organization’s decisions and processes surrounding de-identification of PHI. Attendees will be able to go forward with de-identification with greater confidence, and better sharing of information will be possible.
LIVE ONLINE TRAINING

February 08, Wednesday 10:00 AM PST | 01:00 PM EST
Duration: 90 Min

 

$149.00
One Dial-in One Attendee

$899.00
Group-Max. 10 Attendees/Location
(For multiple locations contact Customer Care)

$299.00

$349.00

$199.00
1 Person Unlimited viewing for 6 month info Recorded Link and Ref. material will be available in My CO Section 48 hrs after completion of Live training
(For multiple locations contact Customer Care)

$249.00
Downloadable file is for usage in one location only. info Downloadable link along with the materials will be emailed within 2 business days after completion of Live training
(For multiple locations contact Customer Care)

 

 

Customer Care

Fax: +1-650-362-2367

Email: [email protected]

Read Frequently Asked Questions

Why Should You Attend:

Today health information needs to be shared more than ever, but how can that be done most easily within the limits of HIPAA? One way is to de-identify the information. Once PHI has been de-identified, it is no longer protected under HIPAA and may be shared freely without limitation. The problem is that it is not easy to truly de-identify information and if it is not done correctly, the sharing of the information may be considered a breach that requires reporting to HHS and the potential for penalties and corrective action plans.

De-identification of Protected Health Information requires removing all eighteen of the listed identifiers, or anything else that might be used to identify the individual about whom the information exists. Or you can have an expert certify that the information is not identifiable. But neither of these is foolproof. You need to look more closely to be sure the data cannot be identified.

Sometimes you may need information for research that does not require specific identification of the individual, but does need some information listed in the eighteen identifiers, such as Zip code, dates of birth or death, or dates of treatment. In those cases, often partially de-identified data, known as a Limited Data Set, will suffice, and such data can be used without obtaining an Authorization or approval by a review board. The information must still be protected with HIPAA-quality security, but it can be used for research under a Data Use Agreement.

There are specific steps that you must go through to ensure that if you want to de-identify PHI, you actually do so properly, and that the resulting information is truly de-identified and its use or disclosure will not result in a reportable breach under HIPAA. If you create a Limited Data Set, you need to ensure the proper agreements are in place and the information is transmitted securely. If de-identification or a Limited Data Set are not possible, the appropriate Authorizations or approvals must be in place before sharing the data.

This session will explore the concepts and methods of de-identification and many of the typical questions that arise. Attendees will be able to go forward with de-identification with greater confidence, and better sharing of information will be possible.

Areas Covered in the Webinar:

  • De-identification and its Rationale
  • The De-identification Standard
  • Preparation for De-identification
  • Guidance on Satisfying the Expert Determination Method
    • Who is an expert
    • How do experts assess the risk of identification of information
    • What are the approaches by which an expert assesses the risk that health information can be identified
    • What are the approaches by which an expert mitigates the risk of identification of an individual in health information
  • Guidance on Satisfying the Safe Harbor Method
    • What are examples of dates that are not permitted according to the Safe Harbor Method
    • What constitutes "any other unique identifying number, characteristic, or code" with respect to the Safe Harbor method of the Privacy Rule
    • What is "actual knowledge that the remaining information could be used either alone or in combination with other information to identify an individual who is a subject of the information."

Who Will Benefit:

This webinar will provide valuable assistance to all personnel in Medical offices, practice groups, hospitals, academic medical centers, insurers, business associates (shredding, data storage, systems vendors, billing services, etc.). The titles are:

  • CEO
  • HIPAA Privacy Officers
  • HIPAA Security Officers
  • Information Security Officers
  • Risk Managers
  • Compliance Officers
  • Privacy Officers
  • Health Information Managers
  • Information Technology Managers
  • Information Systems Managers
  • Medical Office Managers
  • Chief Financial Officers
  • Systems Managers
  • Chief Information Officer
  • Healthcare Counsel/lawyer
  • Operations Directors
Instructor Profile:
Jim Sheldon-Dean

Jim Sheldon-Dean
Principal and Director of Compliance Services, Lewis Creek Systems, LLC

Jim Sheldon-Dean is the founder and director of compliance services at Lewis Creek Systems, LLC, a Vermont-based consulting firm founded in 1982, providing information privacy and security regulatory compliance services to a wide variety of health care entities. He is a frequent speaker regarding HIPAA, including speaking engagements at numerous regional and national healthcare association conferences and conventions and the annual NIST/OCR HIPAA Security Conference. Sheldon-Dean has more than two decades of experience specializing in HIPAA compliance, four decades of experience in policy analysis and implementation, business process analysis, information systems and software development, and eight years of experience doing hands-on medical work as a Vermont certified volunteer emergency medical technician. Sheldon-Dean received his B.S. degree, summa cum laude, from the University of Vermont and his master’s degree from the Massachusetts Institute of Technology.

Topic Background:

Health information is afforded all kinds of protections under the HIPAA regulations but once the information is de-identified, it is no longer protected under HIPAA and can be used or disclosed without limitation. The problem is, de-identification of PHI is harder than it seems. Even if all the identifiers listed in the rules are removed, the context of information and other external factors can reveal the identity of the subject. Following the guidance provided by HHS and the National Institute of Standards and Technology (NIST) is essential to avoiding inappropriate disclosures that may reveal a patient's identity and result in fines.

In some cases, it may be possible to share the needed information more easily once it has been properly de-identified. While releasing information for research purposes may call for a HIPAA Authorization from each patient or approval by review boards and stringent controls on the information, if the research can be done without the identifying data, such Authorizations are reviews are not necessary.

But truly de-identifying information is not a simple or foolproof process. Oftentimes the context of the information or the uniqueness of information can give away the identity. If information is not properly de-identified and released inappropriately as a result, it can result in fines and corrective action plans that can reach into the millions of dollars. The right process needs to be followed to ensure that data that is shared is shared appropriately, either as identifiable information, as a partially de-identified Limited Data Set, or as properly de-identified information.

Follow us :

 

 

Refund Policy

Our refund policy is governed by individual products and services refund policy mentioned against each of offerings. However in absence of specific refund policy of an offering below refund policy will be effective.
Registrants may cancel up to two working days prior to the course start date and will receive a letter of credit to be used towards a future course up to one year from date of issuance. ComplianceOnline would process/provide refund if the Live Webinar has been cancelled. The attendee could choose between the recorded version of the webinar or refund for any cancelled webinar. Refunds will not be given to participants who do not show up for the webinar. On-Demand Recordings can be requested in exchange. Webinar may be cancelled due to lack of enrolment or unavoidable factors. Registrants will be notified 24hours in advance if a cancellation occurs. Substitutions can happen any time. On-Demand Recording purchases will not be refunded as it is available for immediate streaming. However if you are not able to view the webinar or you have any concern about the content of the webinar please contact us at below email or by call mentioning your feedback for resolution of the matter. We respect feedback/opinions of our customers which enables us to improve our products and services. To contact us please email [email protected] call +1-888-717-2436 (Toll Free).

 

 

+1-888-717-2436

6201 America Center Drive Suite 240, San Jose, CA 95002, USA

Follow Us

facebook twitter linkedin youtube

 

Copyright © 2021 ComplianceOnline.com MetricStream
Our Policies: Terms of use | Privacy

PAYMENT METHOD: 100% Secure Transaction

payment method