Orange County NC Website
Policy 22: Policy on Breaches of Unsecured PHI <br /> North State Medical Transport <br /> Policy on Breaches of Unsecured Protected Health Information <br /> Purpose <br /> Under the Health Information Technology for Economic and Clinical Health Act (the <br /> "HITECH Act") North State Medical Transport has an obligation, following the discovery of a <br /> breach of unsecured protected health information ("PHI"), to notify each individual whose <br /> unsecured PHI has been, or is reasonably believed to have been, accessed, acquired, used, or <br /> disclosed. North State Medical Transport also has an obligation to notify the Department of <br /> Health and Human Services ("HHS") of all breaches. In some cases, North State Medical <br /> Transport must notify media outlets about breaches of unsecured PHI. This policy details how <br /> North State Medical Transport will handle and respond to suspected and actual breaches of <br /> unsecured PHI. <br /> Scope <br /> This Policy applies to all North State Medical Transport staff members who come into <br /> contact with PHI. All suspected breach incidents shall be brought to the attention of the HIPAA <br /> Compliance Officer and the HIPAA Compliance Officer shall investigate each incident and <br /> initiate the appropriate response to the incident. <br /> Procedure <br /> Breach Defined <br /> 1. A breach is the acquisition, access, use, or disclosure of unsecured PHI in a manner not <br /> permitted under the HIPAA Privacy Rule which compromises the security or privacy of <br /> the PHI. <br /> a. An acquisition, access, use, or disclosure of PHI created, received, maintained or <br /> transmitted by North State Medical Transport that is not permitted by HIPAA is <br /> presumed to be a breach unless North State Medical Transport demonstrates <br /> that there is a low probability that the PHI has been compromised based on a <br /> "risk assessment" of at least the following factors: <br /> i. The nature and extent of the PHI involved, including the types of identifiers <br /> and the likelihood of re-identification; <br /> ii. The unauthorized person who used the PHI or to whom the disclosure was <br /> made; <br />