Hi. My name is Kelly Hander Han, and I'll be your instructor for our class on HIPPA Health Insurance Portability and Accountability Act. Now, what will be covering for today and obviously HIPPA is very large covers a lot of information.
There are over 508 rules and regulations and pieces to Pippa.
So what we're gonna do is we're gonna focus on the basics and give a good overview of the material that you'll need toe work in an organization that handles health care information for patients. When I cover these overview classes, what I like to hit on, it's kind of the who, what, where, when, why and how
elements and what we're gonna focus on today. Specifically, you're gonna be why
we need HIPPA. What HIPPA does, who it applies to and how it helps us protect our information. So what I have appear on the screens are have our agenda and we're gonna start right off the bat with why why is hip important? Why do we care about it? Why is it something that you're sitting through an hour long class on
and really get to the bottom of wides necessary?
Then we're gonna move right into the material and talk about what hip is. We've already said that it's the Health Insurance Portability and Accountability act. What does that really mean?
And when we look at him or we're gonna examine, two main rules will enter. We'll talk about the privacy rule and we'll talk about the security rule, and it sounds like those two terms are very, very similar. When we talk about keeping information private,
we use security to do so, and that really is the relationship. They're very closely related terms,
but they are still different.
So we can't really talk about either of those rules without first talking about what we're trying to protect and that's protected health information. P h I. And that's an acronym. We're gonna use a lot, and we'll talk about what elements are considered to be protected health information because that's really toe hip applies
now from there, after we cover the privacy rule in the security rule, we'll talk about the, uh, safeguards that hip lays out for us as in when we're looking to protect information. How do we do that?
And hippos specifies that we need a layer defense and When we talk about a layer defense, you may also hear the term
And the premise of that is that there is no one device. There's no one mechanism that will protect your data. So what do we do? We have a Siri's of controls or safeguards, and you may hear me use both of those terms. And basically those air mechanisms that we used to proactively or perhaps reactively, protect our information.
So that layering comes from
physical controls like door locks, something that basic administrative controls, like policy and then technical controls like encryption. And we need a combination of those controls really, To protect our information, we'll talk about the entities to whom Hip applies.
We'll talk about a health care provider, a business associate and then, of course, subcontractors.
Because these are the elements that have to abide by hip hop.
And finally, before we wrap up, we'll talk about okay with Pippa dictating how we have to protect our protected health information. Then can we? Are there exceptions to HIPPA? Are there elements in which this Ph I information can actually be shared,
perhaps even without the patient's consent, So we'll talk about some issues
where that can occur as well. And then, of course, we're going to go back and give a quick review of everything that we've talked about and just kind of wrap this up for you. So that's the material that we're gonna cover today, and I hope you stick around for our information on him.