SlideShare ist ein Scribd-Unternehmen logo
1 von 11
Downloaden Sie, um offline zu lesen
CONFIDENTIALITY
Effective Training for Healthcare
Employees
MHA 690 Health Care Capstone
By Jacqueline C Winston
TERMS TO KNOW
HIPAA
First comprehensive federal protection for
privacy and individually identifiable
protected health information (PHI), 1996
Terms to Know
(HITECH) Health Information Technology
for Economic and Clinical Health Act is
part of the American Recovery and
Reinvestment Act (ARRA) of 2009.
Purpose of HITECH Act
Portions of the HITECH Act are designed
to strengthen HIPAA rules that address
privacy and security matters concerning
electronic transmission of health
information (Cascardo, 2012).
Health and Human Services
Health and Human Services (HHS):
Under ARRA, a healthcare organization
must notify individuals of any security
breach and keep a log of breaches to
submit annually to HHS (Cascardo,
2012).
WARNING
If there is a breach of “unsecured PHI,” a
healthcare organization is required by
law to notify each individual whose PHI
was breached within 60 days of
discovery of breach (Cascardo, 2012).
Security Breach
Any notification of a security breach must
be sent in writing by first-class mail;
email may also be used.
Security Breach
HHS must be notified immediately if the
breach involves more than 500
individuals; media must also be notified.
Review of Policies &
Procedures
 Staff will be trained on appropriate measures
required to review patient files and maintain
confidentiality (Cascardo, 2012).
 Staff will be trained with respect to the
reporting of breaches.
 Reprimands will be imposed on any staff that
does not comply with breach notification
procedures.
Review of Policies and
Procedures
 Procedures will be discussed on how to
file a complaint under the HHS rules.
 Individuals are within their rights to file a
complaint under HHS regulations.
 All staff will be properly trained in
HIPAA compliance.
Reference
Cascardo, D. (2012). What to do before the office for civil rights
comes knocking: Part I. The Journal of Medical Practice
Management: MPM, 27(6), 337-40. Retrieved from http://search
.proquest.com/docview/1242495446?accountid=32521

Weitere ähnliche Inhalte

Was ist angesagt?

Introduction hippaa
Introduction hippaaIntroduction hippaa
Introduction hippaa
Tina Peña
 

Was ist angesagt? (16)

HIPAA Training Basics
HIPAA Training BasicsHIPAA Training Basics
HIPAA Training Basics
 
Maintaining patient privacy
Maintaining patient privacyMaintaining patient privacy
Maintaining patient privacy
 
Got Compliance? Staying within the HIPAA law
Got Compliance?Staying within the HIPAA law  Got Compliance?Staying within the HIPAA law
Got Compliance? Staying within the HIPAA law
 
Hippa presentation
Hippa presentationHippa presentation
Hippa presentation
 
HIPAA Compliance
HIPAA Compliance HIPAA Compliance
HIPAA Compliance
 
Confidentiality Rules
Confidentiality RulesConfidentiality Rules
Confidentiality Rules
 
HIPAA's Title II- Administrative Simplification Rules: The Three Basic Rules ...
HIPAA's Title II- Administrative Simplification Rules: The Three Basic Rules ...HIPAA's Title II- Administrative Simplification Rules: The Three Basic Rules ...
HIPAA's Title II- Administrative Simplification Rules: The Three Basic Rules ...
 
Introduction hippaa
Introduction hippaaIntroduction hippaa
Introduction hippaa
 
Hm300 week 1 part 1 of 2
Hm300 week 1 part 1 of 2Hm300 week 1 part 1 of 2
Hm300 week 1 part 1 of 2
 
HIPAA TITLE II (2)
HIPAA TITLE II (2)HIPAA TITLE II (2)
HIPAA TITLE II (2)
 
Healthcare captstone mha690
Healthcare captstone   mha690Healthcare captstone   mha690
Healthcare captstone mha690
 
Healthcare captstone mha690
Healthcare captstone   mha690Healthcare captstone   mha690
Healthcare captstone mha690
 
Mha690 confidentiality training-week 1, discussion 2
Mha690 confidentiality training-week 1, discussion 2Mha690 confidentiality training-week 1, discussion 2
Mha690 confidentiality training-week 1, discussion 2
 
Patient Confidentiality
Patient Confidentiality Patient Confidentiality
Patient Confidentiality
 
HIPAA Tittle II
HIPAA Tittle IIHIPAA Tittle II
HIPAA Tittle II
 
Facts about privacy
Facts about privacyFacts about privacy
Facts about privacy
 

Ähnlich wie Confidentiality: Effective Training for Healthcare Employees

The challenges to clinical system adoption
The challenges to clinical system adoptionThe challenges to clinical system adoption
The challenges to clinical system adoption
rain2bow
 
The Health Insurance Portability And Accountability Act Essay
The Health Insurance Portability And Accountability Act EssayThe Health Insurance Portability And Accountability Act Essay
The Health Insurance Portability And Accountability Act Essay
Jamie Boyd
 
Health Insurance Portability And Accountability Act (HIPAA
Health Insurance Portability And Accountability Act (HIPAAHealth Insurance Portability And Accountability Act (HIPAA
Health Insurance Portability And Accountability Act (HIPAA
Katie Gulley
 
Mha690 presentation by rachael javidan
Mha690 presentation by rachael javidanMha690 presentation by rachael javidan
Mha690 presentation by rachael javidan
RachaelJavidan
 
Hipa Health Insurance Portability And Accountability Act
Hipa Health Insurance Portability And Accountability ActHipa Health Insurance Portability And Accountability Act
Hipa Health Insurance Portability And Accountability Act
Amy Williams
 
Welcome to HIPAA Training
Welcome to HIPAA TrainingWelcome to HIPAA Training
Welcome to HIPAA Training
Jonathan Montes
 
Privacy and security of information Consider this scenario.docx
Privacy and security of information Consider this scenario.docxPrivacy and security of information Consider this scenario.docx
Privacy and security of information Consider this scenario.docx
ChantellPantoja184
 
Confidentiality power point
Confidentiality power pointConfidentiality power point
Confidentiality power point
Doug Miller
 
HIPAA , REGULATORY AFFAIRS , M.PHARM ...
HIPAA , REGULATORY AFFAIRS , M.PHARM ...HIPAA , REGULATORY AFFAIRS , M.PHARM ...
HIPAA , REGULATORY AFFAIRS , M.PHARM ...
susmitaghosh93
 
Privacy and confidentiality
Privacy and confidentialityPrivacy and confidentiality
Privacy and confidentiality
scarollo
 

Ähnlich wie Confidentiality: Effective Training for Healthcare Employees (20)

The challenges to clinical system adoption
The challenges to clinical system adoptionThe challenges to clinical system adoption
The challenges to clinical system adoption
 
The Health Insurance Portability And Accountability Act Essay
The Health Insurance Portability And Accountability Act EssayThe Health Insurance Portability And Accountability Act Essay
The Health Insurance Portability And Accountability Act Essay
 
Which of the following parties is not among those who should .pdf
 Which of the following parties is not among those who should .pdf Which of the following parties is not among those who should .pdf
Which of the following parties is not among those who should .pdf
 
Health Insurance Portability And Accountability Act (HIPAA
Health Insurance Portability And Accountability Act (HIPAAHealth Insurance Portability And Accountability Act (HIPAA
Health Insurance Portability And Accountability Act (HIPAA
 
Economic Stimulus Package V4
Economic Stimulus Package V4Economic Stimulus Package V4
Economic Stimulus Package V4
 
Mha690 presentation by rachael javidan
Mha690 presentation by rachael javidanMha690 presentation by rachael javidan
Mha690 presentation by rachael javidan
 
Hipa Health Insurance Portability And Accountability Act
Hipa Health Insurance Portability And Accountability ActHipa Health Insurance Portability And Accountability Act
Hipa Health Insurance Portability And Accountability Act
 
Welcome to HIPAA Training
Welcome to HIPAA TrainingWelcome to HIPAA Training
Welcome to HIPAA Training
 
Hipaa Goes Hitech
Hipaa Goes HitechHipaa Goes Hitech
Hipaa Goes Hitech
 
HIPAA | HITECH
HIPAA | HITECHHIPAA | HITECH
HIPAA | HITECH
 
Privacy and security of information Consider this scenario.docx
Privacy and security of information Consider this scenario.docxPrivacy and security of information Consider this scenario.docx
Privacy and security of information Consider this scenario.docx
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippa
 
Confidentiality power point
Confidentiality power pointConfidentiality power point
Confidentiality power point
 
Protecting Patient Health Information in the HITECH Era
Protecting Patient Health Information in the HITECH EraProtecting Patient Health Information in the HITECH Era
Protecting Patient Health Information in the HITECH Era
 
Week 1 discussion 2-confidentiality power point training
Week 1 discussion 2-confidentiality power point trainingWeek 1 discussion 2-confidentiality power point training
Week 1 discussion 2-confidentiality power point training
 
Patients Privacy and Confidentiality
Patients Privacy and ConfidentialityPatients Privacy and Confidentiality
Patients Privacy and Confidentiality
 
HIPAA , REGULATORY AFFAIRS , M.PHARM ...
HIPAA , REGULATORY AFFAIRS , M.PHARM ...HIPAA , REGULATORY AFFAIRS , M.PHARM ...
HIPAA , REGULATORY AFFAIRS , M.PHARM ...
 
Privacy and confidentiality
Privacy and confidentialityPrivacy and confidentiality
Privacy and confidentiality
 
Mha 690 wk1 d2 confidentiality
Mha 690 wk1 d2 confidentialityMha 690 wk1 d2 confidentiality
Mha 690 wk1 d2 confidentiality
 
HIPAA breach report submitted to Congress by DHHS OCR
HIPAA breach report submitted to Congress by DHHS OCRHIPAA breach report submitted to Congress by DHHS OCR
HIPAA breach report submitted to Congress by DHHS OCR
 

Kürzlich hochgeladen

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Kürzlich hochgeladen (20)

MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 

Confidentiality: Effective Training for Healthcare Employees

  • 1. CONFIDENTIALITY Effective Training for Healthcare Employees MHA 690 Health Care Capstone By Jacqueline C Winston
  • 2. TERMS TO KNOW HIPAA First comprehensive federal protection for privacy and individually identifiable protected health information (PHI), 1996
  • 3. Terms to Know (HITECH) Health Information Technology for Economic and Clinical Health Act is part of the American Recovery and Reinvestment Act (ARRA) of 2009.
  • 4. Purpose of HITECH Act Portions of the HITECH Act are designed to strengthen HIPAA rules that address privacy and security matters concerning electronic transmission of health information (Cascardo, 2012).
  • 5. Health and Human Services Health and Human Services (HHS): Under ARRA, a healthcare organization must notify individuals of any security breach and keep a log of breaches to submit annually to HHS (Cascardo, 2012).
  • 6. WARNING If there is a breach of “unsecured PHI,” a healthcare organization is required by law to notify each individual whose PHI was breached within 60 days of discovery of breach (Cascardo, 2012).
  • 7. Security Breach Any notification of a security breach must be sent in writing by first-class mail; email may also be used.
  • 8. Security Breach HHS must be notified immediately if the breach involves more than 500 individuals; media must also be notified.
  • 9. Review of Policies & Procedures  Staff will be trained on appropriate measures required to review patient files and maintain confidentiality (Cascardo, 2012).  Staff will be trained with respect to the reporting of breaches.  Reprimands will be imposed on any staff that does not comply with breach notification procedures.
  • 10. Review of Policies and Procedures  Procedures will be discussed on how to file a complaint under the HHS rules.  Individuals are within their rights to file a complaint under HHS regulations.  All staff will be properly trained in HIPAA compliance.
  • 11. Reference Cascardo, D. (2012). What to do before the office for civil rights comes knocking: Part I. The Journal of Medical Practice Management: MPM, 27(6), 337-40. Retrieved from http://search .proquest.com/docview/1242495446?accountid=32521