Relacionar Columnas HIPAA TrainingVersión en línea Annual HIPAA Training matching game por Patty 1 Each person who handles PHI 2 What is a HIPAA covered entity? 3 Treatment, payment, healthcare operations 4 Unintentional, intentional, and intention with intent. 5 What is PHI? 6 $100.00 to $250.000 and 1 to 10 years in prison 7 Another patient wants to send her friend flowers but didn't know her exact address, she knows she is a FCFMC patient. 8 The right to view and make changes to PHI 9 sleeping, eating, talking and not paying attention 10 Unauthorized access or disclosure of PHI for any reason other than treatment, payment, or healthcare operations. 11 FCFMC employee goes to lunch with another employee. They discuss a patient from earlier in the day. 12 A persons name, date of birth, address and phone number. 13 A fun interactive experience 14 Obligations imposed by HIPAA and the Privacy and Security rules 15 annually or as needed 16 Sharing your secure computer login and password 17 Who enforces the HIPAA Privacy Rules 18 PHI is? 19 Written, oral, electronic information that identifies an individual 20 Provides federal protections for personal health information An open door for someone to access PHI and Violate HIPAA. Who is required to have HIPAA compliance training A health plan, a health care provider, a health clearing house. HIPAA compliance training breach of the Privacy Rule Patient access rights to their PHI HIPAA breach PHI: Private Health Information The past, present, or future payment for the provision of health care of an individual. PHI HIPAA An individual's past, present or future physical or mental health or condition. The Privacy Rule of Health Information Portability and Accountability Act. Requirements for HIPAA compliance training HIPAA breach Re-taking the HIPAA compliance training and receive disciplinary action. The US Department of Health and Human Services through the office of Civil Rights. Legitimate reasons to access PHI without consent Minimum and maximum penalies for HIPAA breaches. What are the types of breaches of HIPAA PHI