SlideShare ist ein Scribd-Unternehmen logo
1 von 19
 Protecting Patients Confidentiality The Health Insurance Portability and Accountability Act of 1996 (HIPAA)
What is HIPAA? A government mandated rule to protect access to and use of patient personal health information Gives patient certain individual rights
What Type of Information Do HIPAA Cover?  Identifiable Protected Health Information (PHI) Information that Identifies a Patient or Individual
Privacy Information What are Identifiable Information?
Answer Pictures Names Birthdates Phone Numbers SSN (social security number) Medical Record Information
Patient’s Rights May review medical record Request correction of any noticeable errors File grievance with provider
Responsibility to Patient Protect and secure PHI (personal health information) Institute policies and procedures for managing PHI
Principles of the Privacy Rule Customer Control Set Boundaries Answerability Civic Accountability Safety
Protected Health Information Policies Guide access to and use of personal health information
Assess to Personal Health Information Is based on who needs to know and minimum necessary information By health care providers By payment activity
Use of Protected Health Information When Providing Patient Health Care Treatment or Services Such as: Verification of insurance Medical treatments
How to Protect Privacy Do not share PHI with non clinical staff Utilize the minimum necessary standard with protected health information Avoid public discussion of patient information Avoid public viewing and access of patient information
When is it allowed to reveal PHI? In court processes (subpoena) Law enforcement processes (criminal investigation)
When is Patient Authorization Required? Receiving Medical Treatment Conducting Medical-Related Tests (AIDS, Drug)
What to Do When Requests are Made for an Individual’s Personal Information Verify who is requesting the information Verify photo (if available) Document the information being given
What Technological System Make It Easy to Access, Copy, and Distribute PHI Computerized Medical Records
Organizations that Enforce HIPAA’S Regulations FBI (federal bureau of investigation) Office for Civil Rights Joint Commission on Accreditation of Healthcare Organization
 For Non-Compliance to HIPAA Security of Privacy rules Civil-Enforced by Office of Civil Rights Criminal-Enforced by Department of Justice Intentionally exposing PHI-1yr sentence & $50,000 fine Falsely accessing PHI-5yr sentence & $100,000 fine Giving PHI to someone with criminal intent-10yr sentence & $250,000 fine
References Mir, S.S. (2011, March). HIPAA Privacy Rule: Maintaining the confidentiality of medical records, Part I. Journal of Health Care Compliance, 13(2), 5-14. Retrieved August 17, 2011, from ABI/INFORM Global  Protecting patients privacy. (n. d.). Retrieved August 17, 2011 from http://cnhs.fiu.edu/ot/pdf/HIPAA_Regulations.ppt   Protecting patient privacy. (n. d.). Retrieved August 17, 2011 from http://www.westernu.edu/bin/nursing/hipaa.pps Wolper, L.F. (2011). Health care administration: Managing organized delivery systems (5th ed.). Boston: Jones and Bartlett.  

Weitere ähnliche Inhalte

Was ist angesagt?

Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentialityptamayo1958
 
Privacy and confidentiality
Privacy and confidentialityPrivacy and confidentiality
Privacy and confidentialityjaredbrady
 
Confidentiality
ConfidentialityConfidentiality
ConfidentialityDeniseMHA
 
Confidentiality in Healthcare
Confidentiality in HealthcareConfidentiality in Healthcare
Confidentiality in Healthcarekmasterson
 
Confidentiality
ConfidentialityConfidentiality
Confidentialityblutoothe
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA BasicsKarna *
 
Lecture 13 privacy, confidentiality and medical records
Lecture 13 privacy, confidentiality and medical recordsLecture 13 privacy, confidentiality and medical records
Lecture 13 privacy, confidentiality and medical recordsDr Ghaiath Hussein
 
Confidentiality
Confidentiality Confidentiality
Confidentiality pcsamuels10
 
Patient Confidentiality
Patient ConfidentialityPatient Confidentiality
Patient Confidentialitymarosemond
 
Health Information Privacy and Security (November 8, 2021)
Health Information Privacy and Security (November 8, 2021)Health Information Privacy and Security (November 8, 2021)
Health Information Privacy and Security (November 8, 2021)Nawanan Theera-Ampornpunt
 
The importance of confidentiality
The importance of confidentialityThe importance of confidentiality
The importance of confidentialityswilson0050
 
Upholding confidentiality
Upholding confidentialityUpholding confidentiality
Upholding confidentialityTheresa Tapley
 
Privacy and confidentiality
Privacy and confidentialityPrivacy and confidentiality
Privacy and confidentialityjohnzinn
 
Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)bholmes
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippamaggie_Platt
 
Lecture 13 privacy, confidentiality and medical records
Lecture 13 privacy, confidentiality and medical recordsLecture 13 privacy, confidentiality and medical records
Lecture 13 privacy, confidentiality and medical recordsDr Ghaiath Hussein
 
Patient Privacy and Safety in Healthcare
Patient Privacy and Safety in HealthcarePatient Privacy and Safety in Healthcare
Patient Privacy and Safety in HealthcareQueen Myers
 

Was ist angesagt? (20)

Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentiality
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Privacy and confidentiality
Privacy and confidentialityPrivacy and confidentiality
Privacy and confidentiality
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Confidentiality in Healthcare
Confidentiality in HealthcareConfidentiality in Healthcare
Confidentiality in Healthcare
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA Basics
 
Lecture 13 privacy, confidentiality and medical records
Lecture 13 privacy, confidentiality and medical recordsLecture 13 privacy, confidentiality and medical records
Lecture 13 privacy, confidentiality and medical records
 
Confidentiality
Confidentiality Confidentiality
Confidentiality
 
Patient Confidentiality
Patient ConfidentialityPatient Confidentiality
Patient Confidentiality
 
Health Information Privacy and Security
Health Information Privacy and SecurityHealth Information Privacy and Security
Health Information Privacy and Security
 
Health Information Privacy and Security (November 8, 2021)
Health Information Privacy and Security (November 8, 2021)Health Information Privacy and Security (November 8, 2021)
Health Information Privacy and Security (November 8, 2021)
 
The importance of confidentiality
The importance of confidentialityThe importance of confidentiality
The importance of confidentiality
 
Upholding confidentiality
Upholding confidentialityUpholding confidentiality
Upholding confidentiality
 
Privacy and confidentiality
Privacy and confidentialityPrivacy and confidentiality
Privacy and confidentiality
 
Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippa
 
Lecture 13 privacy, confidentiality and medical records
Lecture 13 privacy, confidentiality and medical recordsLecture 13 privacy, confidentiality and medical records
Lecture 13 privacy, confidentiality and medical records
 
Patient Privacy and Safety in Healthcare
Patient Privacy and Safety in HealthcarePatient Privacy and Safety in Healthcare
Patient Privacy and Safety in Healthcare
 

Ähnlich wie Protecting patients confidentiality slide presentation

Protecting patients privacy slide presentation
Protecting patients privacy slide presentationProtecting patients privacy slide presentation
Protecting patients privacy slide presentationplunkk
 
Mha690 week 1 disc2 10 3-2019
Mha690 week 1 disc2 10 3-2019Mha690 week 1 disc2 10 3-2019
Mha690 week 1 disc2 10 3-2019TTD001
 
Hipaa basics pp2
Hipaa basics pp2Hipaa basics pp2
Hipaa basics pp2martykoepke
 
Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentialityLily Isaacson
 
HIPPA---Chantel Artis Spencer
HIPPA---Chantel Artis SpencerHIPPA---Chantel Artis Spencer
HIPPA---Chantel Artis Spencershay1234
 
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)Sanjeev Bharwan
 
HIPAA and RHIOs
HIPAA and RHIOsHIPAA and RHIOs
HIPAA and RHIOsnobumoto
 
Week 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy trainingWeek 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy trainingvrgill22
 
HIPAA INSERVICE 2017
HIPAA INSERVICE 2017 HIPAA INSERVICE 2017
HIPAA INSERVICE 2017 Meg Oser
 
Hippa and Confidentiality
Hippa and ConfidentialityHippa and Confidentiality
Hippa and Confidentialityramonapage
 
HIPAA Laws
HIPAA LawsHIPAA Laws
HIPAA Lawscitinfo
 

Ähnlich wie Protecting patients confidentiality slide presentation (20)

Patient confidentiality training
Patient confidentiality trainingPatient confidentiality training
Patient confidentiality training
 
Protecting patients privacy slide presentation
Protecting patients privacy slide presentationProtecting patients privacy slide presentation
Protecting patients privacy slide presentation
 
Patient confidentiality training
Patient confidentiality trainingPatient confidentiality training
Patient confidentiality training
 
Mha690 week 1 disc2 10 3-2019
Mha690 week 1 disc2 10 3-2019Mha690 week 1 disc2 10 3-2019
Mha690 week 1 disc2 10 3-2019
 
Hipaa basics pp2
Hipaa basics pp2Hipaa basics pp2
Hipaa basics pp2
 
Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentiality
 
Hipaa inservice
Hipaa inserviceHipaa inservice
Hipaa inservice
 
HIPPA---Chantel Artis Spencer
HIPPA---Chantel Artis SpencerHIPPA---Chantel Artis Spencer
HIPPA---Chantel Artis Spencer
 
HIPAA 2010
HIPAA  2010HIPAA  2010
HIPAA 2010
 
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)
 
HIPAA
HIPAAHIPAA
HIPAA
 
HIPAA and RHIOs
HIPAA and RHIOsHIPAA and RHIOs
HIPAA and RHIOs
 
Week 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy trainingWeek 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy training
 
HIPAA INSERVICE 2017
HIPAA INSERVICE 2017 HIPAA INSERVICE 2017
HIPAA INSERVICE 2017
 
Hippa and Confidentiality
Hippa and ConfidentialityHippa and Confidentiality
Hippa and Confidentiality
 
Hippa
HippaHippa
Hippa
 
HIPAA Laws
HIPAA LawsHIPAA Laws
HIPAA Laws
 
Mha 690 w1 d2
Mha 690 w1 d2Mha 690 w1 d2
Mha 690 w1 d2
 
HIPAA
HIPAAHIPAA
HIPAA
 
HIPAA
HIPAAHIPAA
HIPAA
 

Kürzlich hochgeladen

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 

Kürzlich hochgeladen (20)

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 

Protecting patients confidentiality slide presentation

  • 1. Protecting Patients Confidentiality The Health Insurance Portability and Accountability Act of 1996 (HIPAA)
  • 2. What is HIPAA? A government mandated rule to protect access to and use of patient personal health information Gives patient certain individual rights
  • 3. What Type of Information Do HIPAA Cover? Identifiable Protected Health Information (PHI) Information that Identifies a Patient or Individual
  • 4. Privacy Information What are Identifiable Information?
  • 5. Answer Pictures Names Birthdates Phone Numbers SSN (social security number) Medical Record Information
  • 6. Patient’s Rights May review medical record Request correction of any noticeable errors File grievance with provider
  • 7. Responsibility to Patient Protect and secure PHI (personal health information) Institute policies and procedures for managing PHI
  • 8. Principles of the Privacy Rule Customer Control Set Boundaries Answerability Civic Accountability Safety
  • 9. Protected Health Information Policies Guide access to and use of personal health information
  • 10. Assess to Personal Health Information Is based on who needs to know and minimum necessary information By health care providers By payment activity
  • 11. Use of Protected Health Information When Providing Patient Health Care Treatment or Services Such as: Verification of insurance Medical treatments
  • 12. How to Protect Privacy Do not share PHI with non clinical staff Utilize the minimum necessary standard with protected health information Avoid public discussion of patient information Avoid public viewing and access of patient information
  • 13. When is it allowed to reveal PHI? In court processes (subpoena) Law enforcement processes (criminal investigation)
  • 14. When is Patient Authorization Required? Receiving Medical Treatment Conducting Medical-Related Tests (AIDS, Drug)
  • 15. What to Do When Requests are Made for an Individual’s Personal Information Verify who is requesting the information Verify photo (if available) Document the information being given
  • 16. What Technological System Make It Easy to Access, Copy, and Distribute PHI Computerized Medical Records
  • 17. Organizations that Enforce HIPAA’S Regulations FBI (federal bureau of investigation) Office for Civil Rights Joint Commission on Accreditation of Healthcare Organization
  • 18. For Non-Compliance to HIPAA Security of Privacy rules Civil-Enforced by Office of Civil Rights Criminal-Enforced by Department of Justice Intentionally exposing PHI-1yr sentence & $50,000 fine Falsely accessing PHI-5yr sentence & $100,000 fine Giving PHI to someone with criminal intent-10yr sentence & $250,000 fine
  • 19. References Mir, S.S. (2011, March). HIPAA Privacy Rule: Maintaining the confidentiality of medical records, Part I. Journal of Health Care Compliance, 13(2), 5-14. Retrieved August 17, 2011, from ABI/INFORM Global Protecting patients privacy. (n. d.). Retrieved August 17, 2011 from http://cnhs.fiu.edu/ot/pdf/HIPAA_Regulations.ppt   Protecting patient privacy. (n. d.). Retrieved August 17, 2011 from http://www.westernu.edu/bin/nursing/hipaa.pps Wolper, L.F. (2011). Health care administration: Managing organized delivery systems (5th ed.). Boston: Jones and Bartlett.