CLICK for Home Page and HR Administration Overview
Website Launched:  12/26/1994
Last Update:  2/14/2013
The Integrity Center, Inc.

(972) 484-6140
[ Since 1984 ]
HOME Reference Articles
 
SCREENING
Check List
Backgrounds
TUTORIALS
SERVICE MENU
FCRA
THIS COMPANY
Our Methods
Why Use Us
Myths
Pitfalls
CHECK MYSELF
CHECK NANNY
USEFUL LINKS
Library
Statistics
PRESS RELEASE
The Integrity News

Vol. XII No. 14
ISSN 1081-2717
April 14, 2003


The Integrity Center, Inc.
"objective risk management services"

April 14, 2003

HIPAA's
Privacy Rule
Deadline Is Here

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) is a comprehensive law that addresses a number of health care issues including data transmission and protection, fraud and abuse, insurance portability, and, it defines "The Privacy Rule" which goes into effect today.

  The Privacy Rule generally prevents the disclosure of Protected Health Information (PHI) by "covered entities". You need to become familiar with which of your records are PHI, and which are classified as "employment records".

HIPAA applies to any group health plan that has more than 50 participants, OR that is administered by an entity other than the plan sponsor.

It has been generally assumed that the covered entities are: (1) most group health plans and (2) health care providers.

However, while HIPAA does not give the U.S. Department of Health and Human Services (HHS) the authority to regulate private businesses, and while employers and other plan sponsors are technically not "covered entities", employers may be subject to the Privacy Rule by virtue of acting as a plan sponsor and offering benefit plans to their employees.

Plan sponsors that either require access to PHI to carry out administrative functions, or that become involved in the administration and operation of a group health plan, will have to comply with the HIPAA Privacy Rule on behalf of their group health plans.

  If you have a billing company or any other entity conducting covered electronic HIPAA transactions on your behalf, you are considered to be performing electronic transactions because the billing company or other entity is considered to be an "extension" of you.

There are many other HIPAA considerations that one needs to become familiar with, such as: annual plan receipts, self-insurance, Flexible Spending Arrangements, Family Medical Leave Act, Worker's Compensation, and others. Some facts existing in your organization will make HIPAA applicable, and others will not.

The Privacy Rule generally requires that covered entities take reasonable steps to limit the use or disclosure of PHI to the minimum number of people necessary to accomplish the intended purpose. This includes making reasonable efforts to limit access to PHI to those in the workforce that need access based on their roles in the covered entity. Therefore, redesigning one's facility is probably not necessary. However, covered entities may need to make certain adjustments to their facilities to minimize access, such as isolating and locking file cabinets or records rooms, or providing additional security such as passwords on computers or storage systems used to maintain protected health information.

Email is one of the biggest hurdles of HIPAA compliance. Other vendors use it because it is very inexpensive. As of April 14, 2003, PHI can no longer be put in emails that are not encrypted. The Integrity Center has been saying for years that drug test results and other sensitive health information (now, PHI) cannot be trusted to email. That is why The Integrity Center developed its secure and encrypted client interface The Integrity Connection (tm). Beginning in 1992, we used secure dial-up record transfer, and since 1996, we have been using secure encrypted Internet transfer. Now, getting or exchanging any PHI by non-encrypted email or other insecure means is illegal.

Complying with HIPAA's Privacy Rule is not just a matter of computer technology. Among many other considerations, workers handling PHI need to lay reports face down, keep records locked when they are not in attendance, and not leave messages on phone systems with voice mail that can be accessed by other than the intended necessary recipient.

While you are probably well along with your general HIPAA compliance efforts, if you have not begun your Privacy Rule compliance efforts, then a good starting point for establishing your Privacy Rule compliance program would be to determine:

    what types of PHI you currently receive and handle

    who sees it

    how they use it

    where it is retained, and

    whether such access and use is necessary to accomplish
your covered entity's purposes.

The HIPAA Privacy Rule will certainly impose additional administrative burdens on employers. Although the Privacy Rule includes no authority for private lawsuits, significant penalties may be imposed for violations, including criminal sanctions.

Reports from The Integrity Center, Inc. are all HIPAA compliant. We would be happy to discuss helping you make all of your Background Checking, Employee File, and Benefits Administration records satisfy the Privacy Rule. We have these capabilities on the Internet, and all communications are secure and encrypted. Just give us a call at: (972) 484-6140.


EARLIER
NEWS ITEMS
The Resume
   Problem
Immigration Reform
   Will Mean:
   Employers MUST
   Enforce
   Employment
   Eligibility
   Verification
Economic
   Espionage
Guerrilla
   Reference
   Checks
The Mobile
   Integrity
   Connection (tm)
NEW U.S.
   Law Increases
   Employer Risk
Time
   To
   Shred
Three New
   H.R. Videos
"7 Ways
   To Avoid
   Employees From
   Hell"
Form I-9 Update
   and NEW
   Form I-9 Tools
New Federal Laws
   To Consider
Access To News
   Items For HR
   And Security
   Professionals
Sarbanes-Oxley
   and
   Background
   Checking
Using
   Credit Bureau
   Reports In The
   Hiring Process
Talent Assessments
   Before Mergers
   Acquisitions
   or Investments
Vicarious
   Liability
Medical
   Identity Theft
Federal
   Civil
   Litigation
   Histories
New Items
   for HR and
   Security
   Professionals
Employers
   Offer Help
   Fighting
   I.D. Theft
Avian Flu:
   Business Thinks
   The Unthinkable
New Federal
   Rules That
   Govern Online
   Recruiting
Gaffe Shows Need
   To Screen Current
   Employees At
   Promotion Time
The
   Baby Boomer
   Exodus
Document
   Disposal Law
   Kicked In
   June 1, 2005
A New Wrinkle
   On Age Bias
Don't Let Your
   Vendors
   Compromise
   Employee
   Identity Data
Annoying Hacking
   Has Now Become
   Organized Crime
Persuading
   Your Company
   Management To
   Encourage
   Training
Mainstream Media
   FINALLY Address
   Risks Of Using
   Databases For
   Employment
   Screening
HR Automation
   Can Improve
   Company Finances
   And Innovation
Employers Beware
   The
   "Seal of Approval"
Identity
   Verification
The
   Outsourcing
   Hole
Cyber Age
   Employee Crimes
Security Risk
   From Mobile
   Media Devices
More FCRA
   Amendments
   Could Be Coming
   By Year's End
The FCRA
   Was Amended
   On 12/4/03
Physical Security
   and Information
   Security are
   Merging
Increase
   HR Productivity
Homeland
   Security
   Guidelines
Sarbanes-Oxley:
   Road To
   Compliance
WARNING
Stored Data
   Warning Signs
How to FIND,
   FIX or FIRE,
   Your POOR
   PERFORMERS
ID Verification --
   Inexpensive and
   VERY Effective
The Darkest Side
   Of Identity Theft
Companies Dig
   Deeper Into
   Executive's Pasts
Fraud And New
   Scrutiny Of
   Executives
Be Careful With
   Instant Messaging
   and Wi-Fi
STRESS
Identity
   Management
California
   Data Privacy Rule
Obtaining
   Criminal Histories
   In New York State
"The Privacy Rule"
   in HIPAA
Putting A Crimp In
   The Management
   Of Spam
New Technology
   Facilitates
   Corporate
   Espionage
Identity Theft
   Checklist
Monitoring
   Employees
The Domestic
   Security
   Enhancement Act
NEW
   Overtime
   Pay Rules
The High Cost
   Of Penny-Ante
   Scams
"Signs" That
   You Need To Do A
   Periodic Check
FTC Charges A
   Company With
   FCRA Violations
The NEW
   Integrity
   Connection (tm)
Workplace
   Safety
   Checklist
HR is Splitting
   Into Two
   Separate Parts
Keep Your Eye On
   RFID Technology
Improv At
   The Interview
Real Security
   Won't Come Easy
   Or Cheap
DOs & DON'Ts
   To Minimize
   Violence
Identity
   Theft
Snapshots of
   Federal Laws
TIPS for
   Gramm-Leach-Bliley
   Compliance
The Sarbanes -
   Oxley Act
NEW Calif.
   Background
   Checking Laws
The Benefits
   Of Online
   Job Applications
Compensation
   --- Now It's
   Getting Personal
The United States
   Security Network
Supreme Court
Limits ADA
Supreme Court Will
   Review Law On
   Age Discrimination
Management Sleaze
The Examiner (tm)
Helps You Uncover
The New Face
Of Corporate
Responsibility
The Sarbanes-Oxley
   Corporate
   Reform Law
The Corporate Spy
National Wants and
   Warrants Illegal
No Dangerous
   Jobs For Disabled
Security
   Precautions
   for Businesses
Terminating
   An Employee
Listening in an
   Interview
Arbitration
   vs.
   Litigation
Supreme Court
   Eases Rules for
   Workers Who Sue
Drug Abuse
   Statistics
The Enemy
   Within
Priority:
   Integrity
Funding Terrorism
   With
   Information Theft
Corporate America
vs.
Copyright Theft
Mental Illness
   Workplace Costs
How to
   Fire Properly
Lying
   On Resumes
Workplace
   Guidelines
   To Be Voluntary