SlideShare ist ein Scribd-Unternehmen logo
1 von 19
Patricia Neville
September 26, 2013
MHA 690
Instructor Lu
 Over 120 health care
employees viewed
celebrities’ medical
records
 Medical records
were viewed
between January
2004 – June 2006
 Hospital employees
used management
passwords to view
medical information
 Hospital employees
received disciplinary
action some
including dismissal
 Ethics
 Privacy
 Security
 Trust
 Honesty
 Relationships
 Quality
 Care
 Refers to WHAT is protected
 Information about an individual and the
determination of WHO is permitted to
use, disclose, or access the information
 Refers to HOW information is
safeguarded
 Ensuring privacy by controlling access to
information and protecting it from
inappropriate disclosure and accidental
or intentional destruction or loss (Upstate,
2011).
 The Health Insurance Portability and Accountability
Act (HIPAA) of 1996 is set of statutes designed to
improve the efficiency and effectiveness of the US
health care system:
 • Title I: Title I of HIPAA provides rules to "improve the
portability and continuity of health insurance
coverage" for workers when they change employers.
 • Title II: Title II of HIPAA provides rules for controlling
health care fraud and abuse, and includes an
"Administrative Simplification" section that sets
standards for enabling the electronic exchange of
health information (University, 2013).
 The Office for Civil Rights enforces the HIPAA Privacy
Rule, which protects the privacy of individually
identifiable health information; the HIPAA Security
Rule, which sets national standards for the security of
electronic protected health information; the HIPAA
Breach Notification Rule, which requires covered
entities and business associates to provide
notification following a breach of unsecured
protected health information; and the confidentiality
provisions of the Patient Safety Rule, which protect
identifiable information being used to analyze
patient safety events and improve patient safety
(United, 2013).
 Places limits on how confidential health
information can be shared with others.
 Establishes patient rights to control the
sharing of their health information.
 Puts safeguards in place for confidential
health information collected,
maintained, used, or transmitted in
electronic form
 Shred all paper containing confidential health
information or place in closed receptacles
 When faxing, verify the fax number before sending
 Close doors or privacy curtains when having
discussions of confidential health information
 Do not leave medical records unattended or in open
areas
 Respect the privacy rights of employees who come
here for care by affording their information the
utmost confidentiality it deserves
 Keep confidential health information you hear or see
to yourself (Upstate, 2011)
 Protect your access by not sharing your account
and/or password with others
 Do not write down or post your password on
computer systems
 Never leave a workstation signed on or left
unattended with access to confidential health
information
 Access information in computer systems when you
have a need to- know the information
 Never disable or remove the virus detection software
 Take measures to protect your computer passwords
so that they are not misused
 Provide HIPPA training to all health care
employees
 Distribute a hard copy of HIPPA practices
 Administer an assessment at the
completion of the HIPPA training to
evaluate knowledge obtained
 Implement monthly or quarterly
workshops to stay abreast of HIPPA
modifications and/or additions
 Provide technical training to all health
care employees on accessing medical
information via computer, PDA,
MacBook, tablet, etc
 Assign team leaders of each
department to monitor department
functions to ensure patient
confidentiality and privacy
 Provide each health care employee with
a login and have them formulate a
password of which each department
team leader will have access to monitor
medical record access and review
 Have all health care employees sign
confidentiality statements and
acknowledgements stating their
understanding of HIPPA practices
 Show interactive modules and videos
during HIPPA trainings to encourage
health care employees interaction
 Questionaries' and surveys given to
health care employees as well as
patients may assist team leaders and
managers in developing department
standards and policies in regards to
patient confidentiality and privacy.
 User education concerning virus
protection
 User education in importance of
monitoring login success/failure, and
how to report discrepancies
 User education in password
management
 Education on awareness (Sheidy, 2002).
 Sheidy, D.P. & McMahon, M.K. (2002). Hippa and
training: Web based strategies for compliance.
Retrieved September 26, 2013, from
http://www.ehcca.com/presentations/HIPAA/sheidy-
tue.pdf
 United States Department of Health and Human
Services. (2013). Health information privacy. Retrieved
September 26, 2013, from
http://www.hhs.gov/ocr/privacy/index.html
 Upstate Medical Center. (2011). Protecting patient
confidentiality and security. Retrieved September 26,
2013, from
http://www.upstate.edu/forms/documents/F84037.p
df
 University Information Technology
Services. (2013). What is HIPPA?.
Retrieved September 26, 2013, from
http://kb.iu.edu/data/ayyy.html

Weitere ähnliche Inhalte

Was ist angesagt?

Confidentiality manager training mha 690
Confidentiality manager training mha 690Confidentiality manager training mha 690
Confidentiality manager training mha 690
nikki1919
 
Employee confidentiality training
Employee confidentiality trainingEmployee confidentiality training
Employee confidentiality training
Jessi Morris
 
Health information security system
Health information security systemHealth information security system
Health information security system
Diana Fernandez
 
Mha690 healthcare confidentiality
Mha690 healthcare confidentialityMha690 healthcare confidentiality
Mha690 healthcare confidentiality
asharp625
 
Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentiality
Toni Meeks
 

Was ist angesagt? (20)

Confidentiality manager training mha 690
Confidentiality manager training mha 690Confidentiality manager training mha 690
Confidentiality manager training mha 690
 
Electronic Health Record Standardisation in India
Electronic Health Record Standardisation in IndiaElectronic Health Record Standardisation in India
Electronic Health Record Standardisation in India
 
Electronic health records
Electronic health recordsElectronic health records
Electronic health records
 
Meaningful Use of PHR
Meaningful Use of PHRMeaningful Use of PHR
Meaningful Use of PHR
 
Employee confidentiality training
Employee confidentiality trainingEmployee confidentiality training
Employee confidentiality training
 
Effective Privacy Training
Effective Privacy TrainingEffective Privacy Training
Effective Privacy Training
 
Barriers to Electronic Health Record Adoption
Barriers to Electronic Health Record AdoptionBarriers to Electronic Health Record Adoption
Barriers to Electronic Health Record Adoption
 
EHR - Elecronic Health Record
EHR - Elecronic Health RecordEHR - Elecronic Health Record
EHR - Elecronic Health Record
 
Health information security system
Health information security systemHealth information security system
Health information security system
 
Online Nursing Certificate Programs
Online Nursing Certificate ProgramsOnline Nursing Certificate Programs
Online Nursing Certificate Programs
 
The Electronic Health Record: Using It Effectively & with Meaning
The Electronic Health Record:Using It Effectively & with MeaningThe Electronic Health Record:Using It Effectively & with Meaning
The Electronic Health Record: Using It Effectively & with Meaning
 
Mha690 healthcare confidentiality
Mha690 healthcare confidentialityMha690 healthcare confidentiality
Mha690 healthcare confidentiality
 
Nursing emr power point
Nursing   emr power pointNursing   emr power point
Nursing emr power point
 
Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentiality
 
Rachelle b
Rachelle bRachelle b
Rachelle b
 
Week 7 issues and challenges
Week 7 issues and challengesWeek 7 issues and challenges
Week 7 issues and challenges
 
Electronic Medical Records
Electronic Medical RecordsElectronic Medical Records
Electronic Medical Records
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Major health care information systems (emr, ehr, phr, lhr)
Major health care information systems (emr, ehr, phr, lhr)Major health care information systems (emr, ehr, phr, lhr)
Major health care information systems (emr, ehr, phr, lhr)
 
Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentiality
 

Ähnlich wie Patient confidentiality 9.26.13

Confidentiality 9.26.13
Confidentiality 9.26.13Confidentiality 9.26.13
Confidentiality 9.26.13
pneville0629
 
Training on confidentiality MHA690 Hayden
Training on confidentiality MHA690 HaydenTraining on confidentiality MHA690 Hayden
Training on confidentiality MHA690 Hayden
haydens
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
LeRoy Ulibarri
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
LeRoy Ulibarri
 
Confidentiality training
Confidentiality trainingConfidentiality training
Confidentiality training
Suezqrdh
 
Week 1 dq 2 - confidentiality1
Week 1   dq 2 - confidentiality1Week 1   dq 2 - confidentiality1
Week 1 dq 2 - confidentiality1
mesaunders
 
Week 1 dq 2 - confidentiality1
Week 1   dq 2 - confidentiality1Week 1   dq 2 - confidentiality1
Week 1 dq 2 - confidentiality1
mesaunders
 
Week 1 dq 2 - confidentiality1
Week 1   dq 2 - confidentiality1Week 1   dq 2 - confidentiality1
Week 1 dq 2 - confidentiality1
mesaunders
 
Week 1 dq 2 - confidentiality1
Week 1   dq 2 - confidentiality1Week 1   dq 2 - confidentiality1
Week 1 dq 2 - confidentiality1
mesaunders
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
12ort
 
Week 1 dq 2 - confidentiality1
Week 1   dq 2 - confidentiality1Week 1   dq 2 - confidentiality1
Week 1 dq 2 - confidentiality1
mesaunders
 
Week 1 dq 2 - confidentiality1
Week 1   dq 2 - confidentiality1Week 1   dq 2 - confidentiality1
Week 1 dq 2 - confidentiality1
mesaunders
 
Everlyn moore health care capstone
Everlyn moore health care capstoneEverlyn moore health care capstone
Everlyn moore health care capstone
evelynmoore
 

Ähnlich wie Patient confidentiality 9.26.13 (20)

Confidentiality 9.26.13
Confidentiality 9.26.13Confidentiality 9.26.13
Confidentiality 9.26.13
 
Discussion2
Discussion2 Discussion2
Discussion2
 
HIPAA Presentation
HIPAA PresentationHIPAA Presentation
HIPAA Presentation
 
Training on confidentiality MHA690 Hayden
Training on confidentiality MHA690 HaydenTraining on confidentiality MHA690 Hayden
Training on confidentiality MHA690 Hayden
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
Confidentiality training
Confidentiality trainingConfidentiality training
Confidentiality training
 
Confidentiality Training
Confidentiality TrainingConfidentiality Training
Confidentiality Training
 
Week 1 dq 2 - confidentiality1
Week 1   dq 2 - confidentiality1Week 1   dq 2 - confidentiality1
Week 1 dq 2 - confidentiality1
 
Week 1 dq 2 - confidentiality1
Week 1   dq 2 - confidentiality1Week 1   dq 2 - confidentiality1
Week 1 dq 2 - confidentiality1
 
Week 1 dq 2 - confidentiality1
Week 1   dq 2 - confidentiality1Week 1   dq 2 - confidentiality1
Week 1 dq 2 - confidentiality1
 
Week 1 dq 2 - confidentiality1
Week 1   dq 2 - confidentiality1Week 1   dq 2 - confidentiality1
Week 1 dq 2 - confidentiality1
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Week 1 dq 2 - confidentiality1
Week 1   dq 2 - confidentiality1Week 1   dq 2 - confidentiality1
Week 1 dq 2 - confidentiality1
 
Week 1 dq 2 - confidentiality1
Week 1   dq 2 - confidentiality1Week 1   dq 2 - confidentiality1
Week 1 dq 2 - confidentiality1
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Everlyn moore health care capstone
Everlyn moore health care capstoneEverlyn moore health care capstone
Everlyn moore health care capstone
 
Confidentiality training in healthcare organizations
Confidentiality training in healthcare organizationsConfidentiality training in healthcare organizations
Confidentiality training in healthcare organizations
 
Marc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentationMarc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentation
 

Kürzlich hochgeladen

Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
ZurliaSoop
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
allensay1
 
Mckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingMckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for Viewing
Nauman Safdar
 

Kürzlich hochgeladen (20)

Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service AvailableBerhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
 
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
 
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfArti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdf
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
 
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSCROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
 
HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service AvailableNashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
 
PARK STREET 💋 Call Girl 9827461493 Call Girls in Escort service book now
PARK STREET 💋 Call Girl 9827461493 Call Girls in  Escort service book nowPARK STREET 💋 Call Girl 9827461493 Call Girls in  Escort service book now
PARK STREET 💋 Call Girl 9827461493 Call Girls in Escort service book now
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Mckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingMckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for Viewing
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
Buy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail AccountsBuy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail Accounts
 

Patient confidentiality 9.26.13

  • 1. Patricia Neville September 26, 2013 MHA 690 Instructor Lu
  • 2.  Over 120 health care employees viewed celebrities’ medical records  Medical records were viewed between January 2004 – June 2006  Hospital employees used management passwords to view medical information  Hospital employees received disciplinary action some including dismissal
  • 3.  Ethics  Privacy  Security  Trust  Honesty  Relationships  Quality  Care
  • 4.  Refers to WHAT is protected  Information about an individual and the determination of WHO is permitted to use, disclose, or access the information
  • 5.  Refers to HOW information is safeguarded  Ensuring privacy by controlling access to information and protecting it from inappropriate disclosure and accidental or intentional destruction or loss (Upstate, 2011).
  • 6.  The Health Insurance Portability and Accountability Act (HIPAA) of 1996 is set of statutes designed to improve the efficiency and effectiveness of the US health care system:  • Title I: Title I of HIPAA provides rules to "improve the portability and continuity of health insurance coverage" for workers when they change employers.  • Title II: Title II of HIPAA provides rules for controlling health care fraud and abuse, and includes an "Administrative Simplification" section that sets standards for enabling the electronic exchange of health information (University, 2013).
  • 7.  The Office for Civil Rights enforces the HIPAA Privacy Rule, which protects the privacy of individually identifiable health information; the HIPAA Security Rule, which sets national standards for the security of electronic protected health information; the HIPAA Breach Notification Rule, which requires covered entities and business associates to provide notification following a breach of unsecured protected health information; and the confidentiality provisions of the Patient Safety Rule, which protect identifiable information being used to analyze patient safety events and improve patient safety (United, 2013).
  • 8.  Places limits on how confidential health information can be shared with others.  Establishes patient rights to control the sharing of their health information.  Puts safeguards in place for confidential health information collected, maintained, used, or transmitted in electronic form
  • 9.
  • 10.  Shred all paper containing confidential health information or place in closed receptacles  When faxing, verify the fax number before sending  Close doors or privacy curtains when having discussions of confidential health information  Do not leave medical records unattended or in open areas  Respect the privacy rights of employees who come here for care by affording their information the utmost confidentiality it deserves  Keep confidential health information you hear or see to yourself (Upstate, 2011)
  • 11.  Protect your access by not sharing your account and/or password with others  Do not write down or post your password on computer systems  Never leave a workstation signed on or left unattended with access to confidential health information  Access information in computer systems when you have a need to- know the information  Never disable or remove the virus detection software  Take measures to protect your computer passwords so that they are not misused
  • 12.  Provide HIPPA training to all health care employees  Distribute a hard copy of HIPPA practices  Administer an assessment at the completion of the HIPPA training to evaluate knowledge obtained  Implement monthly or quarterly workshops to stay abreast of HIPPA modifications and/or additions
  • 13.  Provide technical training to all health care employees on accessing medical information via computer, PDA, MacBook, tablet, etc  Assign team leaders of each department to monitor department functions to ensure patient confidentiality and privacy
  • 14.  Provide each health care employee with a login and have them formulate a password of which each department team leader will have access to monitor medical record access and review  Have all health care employees sign confidentiality statements and acknowledgements stating their understanding of HIPPA practices
  • 15.
  • 16.  Show interactive modules and videos during HIPPA trainings to encourage health care employees interaction  Questionaries' and surveys given to health care employees as well as patients may assist team leaders and managers in developing department standards and policies in regards to patient confidentiality and privacy.
  • 17.  User education concerning virus protection  User education in importance of monitoring login success/failure, and how to report discrepancies  User education in password management  Education on awareness (Sheidy, 2002).
  • 18.  Sheidy, D.P. & McMahon, M.K. (2002). Hippa and training: Web based strategies for compliance. Retrieved September 26, 2013, from http://www.ehcca.com/presentations/HIPAA/sheidy- tue.pdf  United States Department of Health and Human Services. (2013). Health information privacy. Retrieved September 26, 2013, from http://www.hhs.gov/ocr/privacy/index.html  Upstate Medical Center. (2011). Protecting patient confidentiality and security. Retrieved September 26, 2013, from http://www.upstate.edu/forms/documents/F84037.p df
  • 19.  University Information Technology Services. (2013). What is HIPPA?. Retrieved September 26, 2013, from http://kb.iu.edu/data/ayyy.html