SlideShare ist ein Scribd-Unternehmen logo
1 von 16
 Has been a federal privacy regulation since 2003. Covers
privacy and security of health information.
 Reviewed in annual education
 Taught in new employee orientation
 The facility Security Officer is Michael Boudreaux
 The facility Privacy Officer is Alane Bryan
 Does not replace HIPAA—it gives it TEETH!
 Requires a breach notification policy
 Encourages EHR adoption
 Provides strict data protection regulations for more
secure patient privacy
Violation Type Each Violation Repeat Violations/Yr.
Did not know $100 - $50,000 $1.5 million
Reasonable Cause $1,000 - $50,000 $1.5 million
Willful Neglect – Corrected $10,000 - $50,000 $1.5 million
Willful Neglect – Not
Corrected
$50,000 $1.5 million
•Healthcare organizations or providers may be held liable
for violations.
•Individual employees may be prosecuted or may be sued
for civil penalties.
 Must notify individuals and HHS and, in some cases the media, of
any substantiated breaches within 60 days.
 Breaches affecting 500 or more patients will be posted to the
HHS.gov website.
 Four factors are used to determine if low to high probability of PHI
is compromise:
1. The nature and extent of the PHI involved in the incident
 Is the PHI sensitive information i.e. Social Security Numbers, or
infectious disease test results
2. The unauthorized recipient of the PHI
 Is another physician receiving the PHI?
3. Whether the PHI was actually acquired or viewed
4. The extent to which the risk to the PHI has been mitigated
 Was it immediately destroyed?
 Mass General
 California Breaches
 BCBS of TN Breach
 Individual Prosecution
 Personal Gain
Stolen laptops/computers
Lost CDs
ID theft/Social Security Numbers
Medicare Fraud
Access to EMR with no job-related need
Using Social Networking to talk about patients
Discussing PHI with employees or family who do not
have a job-related need
Looking at EMR out of concern or curiosity
Telling others that a patient was “in” for treatment
Discussing progress or prognosis in front of family
without permission
Using chart to get information to use against patient in
lawsuit or divorce
Looking in minor child’s EMR
Taking a peek for “educational purposes”
Starting conversations with “Don’t tell anyone I told
you this, but…”
Sharing computer access/passwords
 Treatment, Payment, Operations
 Some law enforcement exceptions
 Public health reporting
 When in doubt, get a Signed Release
 Disclose “minimal necessary” amount of PHI
 Patients/family members requesting patient
information AFTER DISCHARGE should be referred
to the HIM Department
 If a patient requests information during an admission,
make sure the report is FINAL before giving the
information to the patient or to their designee
(document the designee). We do not release
information unless it is in a FINAL status.
 Discuss patient information as quietly as possible
 Try not to say the patient’s name repeatedly
 Make sure paper containing PHI makes it to a shred bin
 Shred bins should be dumped in large bins each day
 Use fax cover sheets with the confidentiality clause
 Do not leave messages with too much information
 Wear your employee ID badge at all times
 Do not take pictures in patient care areas. Patients ,
their names, or their family members may be visible
without you realizing it. It is not worth the risk!!
 Use workstations for intended purposes
 No gaming, no unauthorized downloading of files,
personal emails are subject to access by P&S Surgical
Hospital
 Log-off or lock your computer when you are not using
it
 Make sure others cannot view your computer screen
 Keep passwords secure
 Use your own individual password
 Avoid sharing passwords
 Trigger encryption for emails containing PHI being
sent outside the organization
 If photos must be taken of a patient, use a P&S camera
or device; NEVER use your personal camera or smart
phone
 Never share proprietary or confidential information in
blogs or on social media sites
 Report potential breaches, inappropriate disclosures,
or otherwise suspect behavior to your direct
supervisor, the Privacy Officer, the Security Officer, or
the Corporate Compliance Officer
 End of presentation

Weitere ähnliche Inhalte

Was ist angesagt?

Confidentiality
ConfidentialityConfidentiality
Confidentialityloletawoo
 
THCS Workforce HIPAA Training
THCS Workforce HIPAA TrainingTHCS Workforce HIPAA Training
THCS Workforce HIPAA Trainingkerbertx
 
Legal, Ethical & Social Issues
Legal, Ethical & Social IssuesLegal, Ethical & Social Issues
Legal, Ethical & Social Issuesckrampert
 
Patient confidentiality KIMJACKSON
Patient confidentiality KIMJACKSONPatient confidentiality KIMJACKSON
Patient confidentiality KIMJACKSONKimmyjack1029
 
Introduction to HIPAA and Confidentiality for Employees
Introduction to HIPAA and Confidentiality for EmployeesIntroduction to HIPAA and Confidentiality for Employees
Introduction to HIPAA and Confidentiality for EmployeesHouse of New Hope
 
The importance of confidentiality
The importance of confidentialityThe importance of confidentiality
The importance of confidentialityMOTHOM0556
 
Protecting yourself and others
Protecting yourself and othersProtecting yourself and others
Protecting yourself and otherssatart1944
 
Mha690 wk 1 fletcher
Mha690 wk 1   fletcherMha690 wk 1   fletcher
Mha690 wk 1 fletcherEmed32
 
Training for privacy and cofidentiality
Training for privacy and cofidentialityTraining for privacy and cofidentiality
Training for privacy and cofidentialityDoris DeCree
 
HIPAA EDUCATION
HIPAA EDUCATIONHIPAA EDUCATION
HIPAA EDUCATIONDarcys2856
 

Was ist angesagt? (19)

Hipaa
HipaaHipaa
Hipaa
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
THCS Workforce HIPAA Training
THCS Workforce HIPAA TrainingTHCS Workforce HIPAA Training
THCS Workforce HIPAA Training
 
Legal, Ethical & Social Issues
Legal, Ethical & Social IssuesLegal, Ethical & Social Issues
Legal, Ethical & Social Issues
 
Patient confidentiality KIMJACKSON
Patient confidentiality KIMJACKSONPatient confidentiality KIMJACKSON
Patient confidentiality KIMJACKSON
 
HIPAA
HIPAAHIPAA
HIPAA
 
HIPAA
HIPAAHIPAA
HIPAA
 
HIPAA
HIPAAHIPAA
HIPAA
 
Phitrain
PhitrainPhitrain
Phitrain
 
HIPAA
HIPAAHIPAA
HIPAA
 
HIPAA
HIPAAHIPAA
HIPAA
 
Introduction to HIPAA and Confidentiality for Employees
Introduction to HIPAA and Confidentiality for EmployeesIntroduction to HIPAA and Confidentiality for Employees
Introduction to HIPAA and Confidentiality for Employees
 
The importance of confidentiality
The importance of confidentialityThe importance of confidentiality
The importance of confidentiality
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Protecting yourself and others
Protecting yourself and othersProtecting yourself and others
Protecting yourself and others
 
Hipaa 1
Hipaa 1Hipaa 1
Hipaa 1
 
Mha690 wk 1 fletcher
Mha690 wk 1   fletcherMha690 wk 1   fletcher
Mha690 wk 1 fletcher
 
Training for privacy and cofidentiality
Training for privacy and cofidentialityTraining for privacy and cofidentiality
Training for privacy and cofidentiality
 
HIPAA EDUCATION
HIPAA EDUCATIONHIPAA EDUCATION
HIPAA EDUCATION
 

Andere mochten auch

Quality management education
Quality management educationQuality management education
Quality management educationDirkRhodes
 
Quality Management Education
Quality Management EducationQuality Management Education
Quality Management EducationDirkRhodes
 
7 brinumi
7 brinumi7 brinumi
7 brinumivizav
 
Lpg blogi
Lpg blogiLpg blogi
Lpg blogivizav
 
Cultural sensitivity bariatric patients
Cultural sensitivity bariatric patientsCultural sensitivity bariatric patients
Cultural sensitivity bariatric patientsDirkRhodes
 
Biol 4
Biol 4Biol 4
Biol 4vizav
 
Biol 2
Biol 2Biol 2
Biol 2vizav
 
100 dienas skola
100 dienas skola100 dienas skola
100 dienas skolavizav
 
Hospital Safety Education
Hospital Safety EducationHospital Safety Education
Hospital Safety EducationDirkRhodes
 
Infection Control
Infection ControlInfection Control
Infection ControlDirkRhodes
 
Semiconductor06 april11 020511
Semiconductor06 april11 020511Semiconductor06 april11 020511
Semiconductor06 april11 020511Prafulla Tekriwal
 
Metāli
MetāliMetāli
Metālivizav
 
Corporate compliance annual update
Corporate compliance annual updateCorporate compliance annual update
Corporate compliance annual updateDirkRhodes
 
Europe, 1814-1914: Political Ideologies and Key Events
Europe, 1814-1914:Political Ideologies and Key EventsEurope, 1814-1914:Political Ideologies and Key Events
Europe, 1814-1914: Political Ideologies and Key EventsDave Phillips
 
19c early20c revolutionsinlatinamerica
19c early20c revolutionsinlatinamerica19c early20c revolutionsinlatinamerica
19c early20c revolutionsinlatinamericaDave Phillips
 

Andere mochten auch (20)

Abuse
AbuseAbuse
Abuse
 
Abuse
AbuseAbuse
Abuse
 
Quality management education
Quality management educationQuality management education
Quality management education
 
Hakikat Belajar
Hakikat BelajarHakikat Belajar
Hakikat Belajar
 
Quality Management Education
Quality Management EducationQuality Management Education
Quality Management Education
 
7 brinumi
7 brinumi7 brinumi
7 brinumi
 
Lpg blogi
Lpg blogiLpg blogi
Lpg blogi
 
Cultural sensitivity bariatric patients
Cultural sensitivity bariatric patientsCultural sensitivity bariatric patients
Cultural sensitivity bariatric patients
 
Biol 4
Biol 4Biol 4
Biol 4
 
Biol 2
Biol 2Biol 2
Biol 2
 
100 dienas skola
100 dienas skola100 dienas skola
100 dienas skola
 
Hospital Safety Education
Hospital Safety EducationHospital Safety Education
Hospital Safety Education
 
Infection Control
Infection ControlInfection Control
Infection Control
 
Semiconductor06 april11 020511
Semiconductor06 april11 020511Semiconductor06 april11 020511
Semiconductor06 april11 020511
 
Metāli
MetāliMetāli
Metāli
 
Corporate compliance annual update
Corporate compliance annual updateCorporate compliance annual update
Corporate compliance annual update
 
Europe, 1814-1914: Political Ideologies and Key Events
Europe, 1814-1914:Political Ideologies and Key EventsEurope, 1814-1914:Political Ideologies and Key Events
Europe, 1814-1914: Political Ideologies and Key Events
 
19c early20c revolutionsinlatinamerica
19c early20c revolutionsinlatinamerica19c early20c revolutionsinlatinamerica
19c early20c revolutionsinlatinamerica
 
The New Imperialism
The New ImperialismThe New Imperialism
The New Imperialism
 
Industrial society
Industrial societyIndustrial society
Industrial society
 

Ähnlich wie Annual HIPAA Education

Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)bholmes
 
Sylvia hipaa powerpoint presentation 2010(1)
Sylvia hipaa powerpoint presentation 2010(1)Sylvia hipaa powerpoint presentation 2010(1)
Sylvia hipaa powerpoint presentation 2010(1)bholmes
 
Hipaa education
Hipaa educationHipaa education
Hipaa educationeklundc
 
Week 1 discussion 2 hipaa
Week 1 discussion 2 hipaaWeek 1 discussion 2 hipaa
Week 1 discussion 2 hipaaMADOZI4671
 
Hipaa basics pp2
Hipaa basics pp2Hipaa basics pp2
Hipaa basics pp2martykoepke
 
Hippa training for healthcare employees
Hippa training for healthcare employeesHippa training for healthcare employees
Hippa training for healthcare employeesaminahallen
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA BasicsKarna *
 
Ethical And Legal Aspects Of Health Care
Ethical And Legal Aspects Of Health CareEthical And Legal Aspects Of Health Care
Ethical And Legal Aspects Of Health CareLajpat Rai
 
Upholding confidentiality
Upholding confidentialityUpholding confidentiality
Upholding confidentialityTheresa Tapley
 
Data Security and Privacy Practices
Data Security and Privacy PracticesData Security and Privacy Practices
Data Security and Privacy PracticesSpringfield Clinic
 
Phi presentation week one
Phi presentation week onePhi presentation week one
Phi presentation week oneChelleEast
 
Welcome to the hippa, privacy and security
Welcome to the hippa, privacy and securityWelcome to the hippa, privacy and security
Welcome to the hippa, privacy and securityveve1728
 
Hippa final JU nursing informatics
Hippa final JU nursing informaticsHippa final JU nursing informatics
Hippa final JU nursing informaticskmcanty
 

Ähnlich wie Annual HIPAA Education (20)

Hipaa-2015
Hipaa-2015Hipaa-2015
Hipaa-2015
 
Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)
 
HIPPA
HIPPAHIPPA
HIPPA
 
Sylvia hipaa powerpoint presentation 2010(1)
Sylvia hipaa powerpoint presentation 2010(1)Sylvia hipaa powerpoint presentation 2010(1)
Sylvia hipaa powerpoint presentation 2010(1)
 
Hipaa
HipaaHipaa
Hipaa
 
Hippa 2021
Hippa 2021Hippa 2021
Hippa 2021
 
Hipaa education
Hipaa educationHipaa education
Hipaa education
 
Week 1 discussion 2 hipaa
Week 1 discussion 2 hipaaWeek 1 discussion 2 hipaa
Week 1 discussion 2 hipaa
 
Hipaa basics pp2
Hipaa basics pp2Hipaa basics pp2
Hipaa basics pp2
 
Hipaa
HipaaHipaa
Hipaa
 
Hippa training for healthcare employees
Hippa training for healthcare employeesHippa training for healthcare employees
Hippa training for healthcare employees
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA Basics
 
Ethical And Legal Aspects Of Health Care
Ethical And Legal Aspects Of Health CareEthical And Legal Aspects Of Health Care
Ethical And Legal Aspects Of Health Care
 
Upholding confidentiality
Upholding confidentialityUpholding confidentiality
Upholding confidentiality
 
Basic HIPAA Training by CMU
Basic HIPAA Training by CMUBasic HIPAA Training by CMU
Basic HIPAA Training by CMU
 
Data Security and Privacy Practices
Data Security and Privacy PracticesData Security and Privacy Practices
Data Security and Privacy Practices
 
Phi presentation week one
Phi presentation week onePhi presentation week one
Phi presentation week one
 
Welcome to the hippa, privacy and security
Welcome to the hippa, privacy and securityWelcome to the hippa, privacy and security
Welcome to the hippa, privacy and security
 
Hippa final JU nursing informatics
Hippa final JU nursing informaticsHippa final JU nursing informatics
Hippa final JU nursing informatics
 
HIPAA - Updated.ppt
HIPAA - Updated.pptHIPAA - Updated.ppt
HIPAA - Updated.ppt
 

Kürzlich hochgeladen

Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdfssuserdda66b
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 

Kürzlich hochgeladen (20)

Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 

Annual HIPAA Education

  • 1.
  • 2.  Has been a federal privacy regulation since 2003. Covers privacy and security of health information.  Reviewed in annual education  Taught in new employee orientation  The facility Security Officer is Michael Boudreaux  The facility Privacy Officer is Alane Bryan
  • 3.  Does not replace HIPAA—it gives it TEETH!  Requires a breach notification policy  Encourages EHR adoption  Provides strict data protection regulations for more secure patient privacy
  • 4. Violation Type Each Violation Repeat Violations/Yr. Did not know $100 - $50,000 $1.5 million Reasonable Cause $1,000 - $50,000 $1.5 million Willful Neglect – Corrected $10,000 - $50,000 $1.5 million Willful Neglect – Not Corrected $50,000 $1.5 million •Healthcare organizations or providers may be held liable for violations. •Individual employees may be prosecuted or may be sued for civil penalties.
  • 5.  Must notify individuals and HHS and, in some cases the media, of any substantiated breaches within 60 days.  Breaches affecting 500 or more patients will be posted to the HHS.gov website.  Four factors are used to determine if low to high probability of PHI is compromise: 1. The nature and extent of the PHI involved in the incident  Is the PHI sensitive information i.e. Social Security Numbers, or infectious disease test results 2. The unauthorized recipient of the PHI  Is another physician receiving the PHI? 3. Whether the PHI was actually acquired or viewed 4. The extent to which the risk to the PHI has been mitigated  Was it immediately destroyed?
  • 6.  Mass General  California Breaches  BCBS of TN Breach  Individual Prosecution  Personal Gain
  • 7. Stolen laptops/computers Lost CDs ID theft/Social Security Numbers Medicare Fraud Access to EMR with no job-related need
  • 8. Using Social Networking to talk about patients Discussing PHI with employees or family who do not have a job-related need Looking at EMR out of concern or curiosity Telling others that a patient was “in” for treatment Discussing progress or prognosis in front of family without permission
  • 9. Using chart to get information to use against patient in lawsuit or divorce Looking in minor child’s EMR Taking a peek for “educational purposes” Starting conversations with “Don’t tell anyone I told you this, but…” Sharing computer access/passwords
  • 10.  Treatment, Payment, Operations  Some law enforcement exceptions  Public health reporting  When in doubt, get a Signed Release  Disclose “minimal necessary” amount of PHI
  • 11.  Patients/family members requesting patient information AFTER DISCHARGE should be referred to the HIM Department  If a patient requests information during an admission, make sure the report is FINAL before giving the information to the patient or to their designee (document the designee). We do not release information unless it is in a FINAL status.  Discuss patient information as quietly as possible
  • 12.  Try not to say the patient’s name repeatedly  Make sure paper containing PHI makes it to a shred bin  Shred bins should be dumped in large bins each day  Use fax cover sheets with the confidentiality clause  Do not leave messages with too much information  Wear your employee ID badge at all times  Do not take pictures in patient care areas. Patients , their names, or their family members may be visible without you realizing it. It is not worth the risk!!
  • 13.  Use workstations for intended purposes  No gaming, no unauthorized downloading of files, personal emails are subject to access by P&S Surgical Hospital  Log-off or lock your computer when you are not using it  Make sure others cannot view your computer screen
  • 14.  Keep passwords secure  Use your own individual password  Avoid sharing passwords  Trigger encryption for emails containing PHI being sent outside the organization  If photos must be taken of a patient, use a P&S camera or device; NEVER use your personal camera or smart phone
  • 15.  Never share proprietary or confidential information in blogs or on social media sites  Report potential breaches, inappropriate disclosures, or otherwise suspect behavior to your direct supervisor, the Privacy Officer, the Security Officer, or the Corporate Compliance Officer
  • 16.  End of presentation