11.07.2015 Views

Medical Records and the Law

Medical Records and the Law

Medical Records and the Law

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Summary of Confidentiality Requirements 117on December 28, 2000; became effective on April 14, 2001; <strong>and</strong>were modified on August 14, 2002. 48• National health plan identifiers. No rules have yet been promulgated(in proposed form or o<strong>the</strong>rwise) for this component of <strong>the</strong> AdministrativeSimplification provisions.• Enforcement. Interim final regulations establishing Privacy Ruleenforcement procedures were issued on April 17, 2003. 49 DHHScharacterized <strong>the</strong>se regulations as <strong>the</strong> “first installment” of <strong>the</strong> enforcementrule. More comprehensive enforcement regulations wereproposed on April 18, 2005. 50 These regulations are known as <strong>the</strong>Enforcement Rule.• Claims attachments. No rules have yet been promulgated (in proposedform or o<strong>the</strong>rwise) for this component of <strong>the</strong> AdministrativeSimplification provisions.• National individual identifiers. No rules have yet been promulgated(in proposed form or o<strong>the</strong>rwise) for this component of <strong>the</strong> AdministrativeSimplification provisions.The privacy, security <strong>and</strong> transactions, <strong>and</strong> code set regulations issuedunder HIPAA by DHHS are known as <strong>the</strong> Privacy Rule, 51 <strong>the</strong>Security Rule, 52 <strong>and</strong> <strong>the</strong> TCS Rule, respectively. 53 The Privacy Rulegoverns <strong>the</strong> use <strong>and</strong> disclosure of PHI, <strong>and</strong> addresses how healthcareproviders, clearinghouses, <strong>and</strong> health plans h<strong>and</strong>le health informationin <strong>the</strong> conduct of <strong>the</strong>ir affairs. The Security Rule establishes st<strong>and</strong>ardsfor <strong>the</strong> protection of <strong>the</strong> physical security of electronic PHI (ePHI),<strong>and</strong>, toge<strong>the</strong>r with <strong>the</strong> Privacy Rule, provides for <strong>the</strong> comprehensiveprotection of PHI. The TCS Rule establishes federal st<strong>and</strong>ards for <strong>the</strong>computer codes that may be used in routine business transactions concerning<strong>the</strong> billing <strong>and</strong> payment for healthcare services. HIPAA is anextensive statute that also governs a variety of o<strong>the</strong>r activities that arenot within <strong>the</strong> scope of this text.The Privacy <strong>and</strong> Security Rules apply to PHI used or disclosed by“covered entities.” The rules define covered entities as healthcare4865 Fed. Reg. 82462 (Dec. 28, 2000); 67 Fed. Reg. 53182 (Aug. 14, 2002).4968 Fed. Reg. 18895 (Apr. 17, 2003).5070 Fed. Reg. 20224 (Apr. 18, 2005).5145 C.F.R. §§ 160 <strong>and</strong> 164.5245 C.F.R. §§ 164.302 through 164.318.5345 C.F.R. §§ 162.100 through 162.1802.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!