Melissa marr dentist sequim wa


You have the following rights with respect to certain health information that we have about you (information in a Designated Record Set as defined by HIPAA). To exercise any of these rights, you must submit a written request to our Privacy Official listed on the first page of this Notice.

  • RIGHT TO ACCESS AND REVIEW
  • You may request to access and review a copy of your health information. We may deny your request under certain circumstances. You will receive written notice of a denial and can appeal it. We will provide a copy of your health information in a format you request if it is readily producible. If not readily producible, we will provide it in a hard copy format or other format that is mutually agreeable. If your health information is included in an Electronic Health Record, you have the right to obtain a copy of it in an electronic format and to direct us to send it to the person or entity you designate in an electronic format. We may charge a reasonable fee to cover our cost to provide you with copies of your health information.

  • RIGHT TO AMEND
  • If you believe that your health information is incorrect or incomplete, you may request that we amend it. We may deny your request under certain circumstances. You will receive written notice of a denial and can file a statement of disagreement that will be included with your health information that you believe is incorrect or incomplete.

  • RIGHT TO RESTRICT USE AND DISCLOSURE
  • You may request that we restrict uses of your health information to carry out treatment, payment, or health care operations or to your family member or friend involved in your care or the payment for your care. We may not (and are not required to) agree to your requested restrictions, with one exception: If you pay out of your pocket in full for a service you receive from us and you request that we not submit the claim for this service to your health insurer or health plan for reimbursement, we must honor that request.

  • RIGHT TO CONFIDENTIAL COMMUNICATIONS, ALTERNATIVE MEANS AND LOCATIONS
  • You may request to receive communications of health information by alternative means or at an alternative location. We will accommodate a request if it is reasonable and you indicate that communication by regular means could endanger you. When you submit a written request to the Privacy Official listed on the first page of this Notice, you need to provide an alternative method of contact or alternative address and indicate how payment for services will be handled.

  • RIGHT TO AN ACCOUNTING OF DISCLOSURES
  • You have a right to receive an accounting of disclosures of your health information for the six (6) years prior to the date that the accounting is requested except for disclosures to carry out treatment, payment, health care operations (and certain other exceptions as provided by HIPAA). The first accounting we provide in any 12-month period will be without charge to you. We may charge a reasonable fee to cover the cost for each subsequent request for an accounting within the same 12-month period. We will notify you in advance of this fee and you may choose to modify or withdraw your request at that time.

  • RIGHT TO A PAPER COPY OF THIS NOTICE
  • You have the right to a paper copy of this Notice. You may ask us to give you a paper copy of the Notice at any time (even if you have agreed to receive the Notice electronically). To obtain a paper copy, ask the Privacy Official. G. RIGHT TO RECEIVE NOTIFICATION OF A SECURITY BREACH We are required by law to notify you if the privacy or security of your health information has been breached. The notification will occur by first class mail within sixty (60) days of the event. A breach occurs when there has been an unauthorized use or disclosure under HIPAA that compromises the privacy or security of your health information. The breach notification will contain the following information: (1) a brief description of what happened, including the date of the breach and the date of the discovery of the breach; (2) the steps you should take to protect yourself from potential harm resulting from the breach; and (3) a brief description of what we are doing to investigate the breach, mitigate losses, and to protect against further breaches.