SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Who Should Access
          Confidential Patient
             Information

0 Clinicians during the course of treating a patient
0 The patient
0 Hospital staff that utilizes information for billing and
  coding such as Health Information Management
0 Designated persons by the patient that have signed
  necessary consent forms
Who Should NOT Access
         Confidential Patient
             Information
0 Clinicians that are NOT involved in active patient care and
  treatment
0 Staff that is NOT utilizing patient information for the
  purposes of treatment, billing, or coding.
0 “Curious Staff” or persons
0 Any member of the organization who cannot document, as
  needed, the reasons for accessing the record
How to Keep It Safe
0 Put a footprint in the patient record showing who
 accessed the record and their relationship to the
 patient as part of the care team.
How to Keep it Safe



0 Ensure that each user is educated on the importance of
 keeping their password in a safe place and not sharing with
 other employees. Have yearly training and re-education on the
 importance of privacy within your organization.
How to Keep it Safe

0 Have a dedicated compliance and security officer in
 place within your organization. Policies and
 procedures should be in place regarding privacy that
 clearly outline the repercussions of security and
 privacy violations.
How to Keep it Safe

0 Utilize patient aliases within the patient registration
 and electronic health record to ensure the privacy of
 famous or “well known” individuals.
How to Keep it Safe



0 Shred documentation with patient information
  attached
0 Utilize fax cover sheets when faxing or sending
  patient records
0 Use general rule of thumb – don’t access ANY record
  without a valid reason for reviewing

Weitere ähnliche Inhalte

Was ist angesagt?

Healthcare Confidentiality
Healthcare ConfidentialityHealthcare Confidentiality
Healthcare Confidentialityljbroshious
 
Privacy and confidentiality
Privacy and confidentialityPrivacy and confidentiality
Privacy and confidentialityjaredbrady
 
Confidentiality
Confidentiality Confidentiality
Confidentiality pcsamuels10
 
Confidentiality in the Workplace
Confidentiality in the WorkplaceConfidentiality in the Workplace
Confidentiality in the Workplacesalvarez63
 
susanfullerMha690 week1discussion2pp
susanfullerMha690 week1discussion2ppsusanfullerMha690 week1discussion2pp
susanfullerMha690 week1discussion2ppPrayerful
 
Privacy and confidentiality
Privacy and confidentialityPrivacy and confidentiality
Privacy and confidentialityjohnzinn
 
Upholding confidentiality
Upholding confidentialityUpholding confidentiality
Upholding confidentialityTheresa Tapley
 
Health care confidentiality and privacy
Health care confidentiality and privacyHealth care confidentiality and privacy
Health care confidentiality and privacysawanda
 
Confidentiality
ConfidentialityConfidentiality
ConfidentialityLLSS64
 
Patient Privacy and Safety in Healthcare
Patient Privacy and Safety in HealthcarePatient Privacy and Safety in Healthcare
Patient Privacy and Safety in HealthcareQueen Myers
 
Patient Confidentiality
Patient ConfidentialityPatient Confidentiality
Patient Confidentialitymarosemond
 
Confidentiality
ConfidentialityConfidentiality
ConfidentialityRamiAboali
 
Mandatory hippa and information security
Mandatory hippa and information securityMandatory hippa and information security
Mandatory hippa and information securityHiggi123
 

Was ist angesagt? (18)

Healthcare Confidentiality
Healthcare ConfidentialityHealthcare Confidentiality
Healthcare Confidentiality
 
Privacy and confidentiality
Privacy and confidentialityPrivacy and confidentiality
Privacy and confidentiality
 
Confidentiality
Confidentiality Confidentiality
Confidentiality
 
Confidentiality
Confidentiality Confidentiality
Confidentiality
 
Tasia Confidentiality PPT
Tasia Confidentiality PPTTasia Confidentiality PPT
Tasia Confidentiality PPT
 
Confidentiality in the Workplace
Confidentiality in the WorkplaceConfidentiality in the Workplace
Confidentiality in the Workplace
 
We-All-Play-A-Role
We-All-Play-A-RoleWe-All-Play-A-Role
We-All-Play-A-Role
 
susanfullerMha690 week1discussion2pp
susanfullerMha690 week1discussion2ppsusanfullerMha690 week1discussion2pp
susanfullerMha690 week1discussion2pp
 
Privacy and confidentiality
Privacy and confidentialityPrivacy and confidentiality
Privacy and confidentiality
 
Upholding confidentiality
Upholding confidentialityUpholding confidentiality
Upholding confidentiality
 
Health care confidentiality and privacy
Health care confidentiality and privacyHealth care confidentiality and privacy
Health care confidentiality and privacy
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Patient Privacy and Safety in Healthcare
Patient Privacy and Safety in HealthcarePatient Privacy and Safety in Healthcare
Patient Privacy and Safety in Healthcare
 
Patient Confidentiality
Patient ConfidentialityPatient Confidentiality
Patient Confidentiality
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Mandatory hippa and information security
Mandatory hippa and information securityMandatory hippa and information security
Mandatory hippa and information security
 
Mha wk 1 dis 2
Mha wk 1 dis 2Mha wk 1 dis 2
Mha wk 1 dis 2
 
Week 1 discussion 2
Week 1 discussion 2Week 1 discussion 2
Week 1 discussion 2
 

Andere mochten auch

Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionIn a Rocket
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting PersonalKirsty Hulse
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanPost Planner
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldabaux singapore
 

Andere mochten auch (7)

Keep it confidential v2
Keep it confidential v2Keep it confidential v2
Keep it confidential v2
 
Keep it confidential
Keep it confidentialKeep it confidential
Keep it confidential
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming Convention
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting Personal
 
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job? Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media Plan
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
 

Ähnlich wie Keep it confidential v3

Lecture 13 privacy, confidentiality and medical records
Lecture 13 privacy, confidentiality and medical recordsLecture 13 privacy, confidentiality and medical records
Lecture 13 privacy, confidentiality and medical recordsDr Ghaiath Hussein
 
Lecture 13 privacy, confidentiality and medical records
Lecture 13 privacy, confidentiality and medical recordsLecture 13 privacy, confidentiality and medical records
Lecture 13 privacy, confidentiality and medical recordsDr Ghaiath Hussein
 
medical proffessionalism
medical proffessionalismmedical proffessionalism
medical proffessionalismmitepajoseph
 
Patient privacy wsanders
Patient privacy wsandersPatient privacy wsanders
Patient privacy wsandersmichellewand
 
Welcome to the hippa, privacy and security
Welcome to the hippa, privacy and securityWelcome to the hippa, privacy and security
Welcome to the hippa, privacy and securityveve1728
 
Good medical practice 29 mac 2016
Good medical practice 29 mac 2016Good medical practice 29 mac 2016
Good medical practice 29 mac 2016Lee Oi Wah
 
Patient privacy 2.0 slides
Patient privacy 2.0 slidesPatient privacy 2.0 slides
Patient privacy 2.0 slidesandibear
 
HIPAA and Privacy Training
HIPAA and Privacy TrainingHIPAA and Privacy Training
HIPAA and Privacy TrainingJasAmataga
 
Mha 690 discussion 1 2
Mha 690 discussion 1 2Mha 690 discussion 1 2
Mha 690 discussion 1 2radark-9
 
Mha 690 discussion 1 2
Mha 690 discussion 1 2Mha 690 discussion 1 2
Mha 690 discussion 1 2radark-9
 
Health information confidentiality
Health information confidentialityHealth information confidentiality
Health information confidentialityJames Noon
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA BasicsKarna *
 
Healthcare Compliance and Privacy/Security Training by UCONN
Healthcare Compliance and Privacy/Security Training by UCONNHealthcare Compliance and Privacy/Security Training by UCONN
Healthcare Compliance and Privacy/Security Training by UCONNAtlantic Training, LLC.
 
Marc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentationMarc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentationMarcEtienne6
 
The Financial Impact Of Medical Identity Fraud On Patients: A Guide By Healt...
 The Financial Impact Of Medical Identity Fraud On Patients: A Guide By Healt... The Financial Impact Of Medical Identity Fraud On Patients: A Guide By Healt...
The Financial Impact Of Medical Identity Fraud On Patients: A Guide By Healt...Health 2Conf
 

Ähnlich wie Keep it confidential v3 (20)

Lecture 13 privacy, confidentiality and medical records
Lecture 13 privacy, confidentiality and medical recordsLecture 13 privacy, confidentiality and medical records
Lecture 13 privacy, confidentiality and medical records
 
Lecture 13 privacy, confidentiality and medical records
Lecture 13 privacy, confidentiality and medical recordsLecture 13 privacy, confidentiality and medical records
Lecture 13 privacy, confidentiality and medical records
 
medical proffessionalism
medical proffessionalismmedical proffessionalism
medical proffessionalism
 
Understanding hipaa
Understanding hipaaUnderstanding hipaa
Understanding hipaa
 
Patient privacy wsanders
Patient privacy wsandersPatient privacy wsanders
Patient privacy wsanders
 
Welcome to the hippa, privacy and security
Welcome to the hippa, privacy and securityWelcome to the hippa, privacy and security
Welcome to the hippa, privacy and security
 
Good medical practice 29 mac 2016
Good medical practice 29 mac 2016Good medical practice 29 mac 2016
Good medical practice 29 mac 2016
 
Patient privacy
Patient privacyPatient privacy
Patient privacy
 
Mha690 w1 d2
Mha690 w1 d2Mha690 w1 d2
Mha690 w1 d2
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Patient privacy 2.0 slides
Patient privacy 2.0 slidesPatient privacy 2.0 slides
Patient privacy 2.0 slides
 
HIPAA and Privacy Training
HIPAA and Privacy TrainingHIPAA and Privacy Training
HIPAA and Privacy Training
 
Mha 690 discussion 1 2
Mha 690 discussion 1 2Mha 690 discussion 1 2
Mha 690 discussion 1 2
 
Mha 690 discussion 1 2
Mha 690 discussion 1 2Mha 690 discussion 1 2
Mha 690 discussion 1 2
 
Health information confidentiality
Health information confidentialityHealth information confidentiality
Health information confidentiality
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA Basics
 
Healthcare Compliance and Privacy/Security Training by UCONN
Healthcare Compliance and Privacy/Security Training by UCONNHealthcare Compliance and Privacy/Security Training by UCONN
Healthcare Compliance and Privacy/Security Training by UCONN
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Marc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentationMarc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentation
 
The Financial Impact Of Medical Identity Fraud On Patients: A Guide By Healt...
 The Financial Impact Of Medical Identity Fraud On Patients: A Guide By Healt... The Financial Impact Of Medical Identity Fraud On Patients: A Guide By Healt...
The Financial Impact Of Medical Identity Fraud On Patients: A Guide By Healt...
 

Keep it confidential v3

  • 1.
  • 2. Who Should Access Confidential Patient Information 0 Clinicians during the course of treating a patient 0 The patient 0 Hospital staff that utilizes information for billing and coding such as Health Information Management 0 Designated persons by the patient that have signed necessary consent forms
  • 3. Who Should NOT Access Confidential Patient Information 0 Clinicians that are NOT involved in active patient care and treatment 0 Staff that is NOT utilizing patient information for the purposes of treatment, billing, or coding. 0 “Curious Staff” or persons 0 Any member of the organization who cannot document, as needed, the reasons for accessing the record
  • 4. How to Keep It Safe 0 Put a footprint in the patient record showing who accessed the record and their relationship to the patient as part of the care team.
  • 5. How to Keep it Safe 0 Ensure that each user is educated on the importance of keeping their password in a safe place and not sharing with other employees. Have yearly training and re-education on the importance of privacy within your organization.
  • 6. How to Keep it Safe 0 Have a dedicated compliance and security officer in place within your organization. Policies and procedures should be in place regarding privacy that clearly outline the repercussions of security and privacy violations.
  • 7. How to Keep it Safe 0 Utilize patient aliases within the patient registration and electronic health record to ensure the privacy of famous or “well known” individuals.
  • 8. How to Keep it Safe 0 Shred documentation with patient information attached 0 Utilize fax cover sheets when faxing or sending patient records 0 Use general rule of thumb – don’t access ANY record without a valid reason for reviewing