SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Upholding
Confidentiality
It is your ethical responsibility
       Theresa Tapley
MHA690: Health Care Capstone
     Ashford University
       Dr. David Cole
        April 23, 2013
Objectives
 Understanding    of HIPAA
 Ethical Responsibility to keep each and
  every patient’s PHI confidential
 Patient Privacy Rule and Security Rules
 Identification of what PHI is
 Ways to protect PHI
 Tips for electronic confidentiality
  protections
 Consequences if confidentiality or PHI
  mishandlement
What is Health Insurance Portability and
     Accountability Act (HIPAA)?
 HIPPA  is a federal law that gives an
  individual the right of protection of their
  personal health information (PHI).
 PHI includes all medical and personal
  information and must be protected
  whether communication is
  verbal, written, or electronic.

(U.S. Department HHS, 2012)
Forms of Sensitive Information
          Sensitive Information exists in various forms




Printed                  Spoken                Electronic

       It is the responsibility of every employee to
 protect the privacy and security of sensitive information
                         in ALL forms
What Information is Considered Confidential
         and must be Protected?
                          Personal billing information

                          All medical records

                          Conversations between
                           physician and other
                           medical staff regarding a
                           patient

                          Information about a
                           patient within their
                           Insurance carrier’s
                           database
Patient Privacy Rule Rights
            The right to see and obtain a copy of
             their health record

            The right to have corrections added to
             their personal health record

            The right to receive notice about how
             their health information will be used or
             shared for certain purposes

            The right to get a report of when and
             why their health information was shared

            The right to file a complaint with the
             provider or health insurer

            The right to file a complaint with the U. S.
             Government
Personal Health Information
How to keep it confidential
                 Never leave medical
                  records where others can
                  gain access to them

                 PHI should be guarded and
                  kept confidential, shared
                  only with healthcare
                  providers involved in their
                  healthcare

                 PHI is confidential and
                  should not be viewed on
                  paper or on computer by
                  unauthorized staff
Ways to Protect Confidentiality of PHI
   PHI should only be shared with other healthcare
    professionals directly involved in an individual’s
    care
    Records are kept locked and only people with a
    need to see information about patients have
    access to them
   Employees who use computerized patient records
    to not leave their computers logged in to the
    patient information system while they are not at
    their workstations. Computer screens containing
    patient information are turned away from the view
    of the public or people passing by.
More Ways to Protect Confidentiality of PHI
   Posted or written patient information maintained in
    work areas such as nurses’ stations or front desk is
    kept covered from the public.
   Discussions about patient care are kept private to
    reduce the likelihood that those who do not need
    to know will overhear.
   Electronic records are kept secure, and the facility
    monitors who gains access to records to ensure
    that they are being used appropriately.
   Paper records are always shredded or placed in
    closed receptacles for delivery to a company that
    destroys records for the facility. They must never
    be left in the garbage.
Understanding the Security Rule
   Specifies a series of administrative, physical, and technical
    safeguards for covered entities to use to assure the
    confidentiality, integrity, and availability of electronic
    protected health information

   The Security Rule defines “confidentiality” to mean that e-PHI is
    not available or disclosed to unauthorized persons. The Security
    Rule's confidentiality requirements support the Privacy Rule's
    prohibitions against improper uses and disclosures of PHI

   The Security rule also promotes the two additional goals of
    maintaining the integrity and availability of e-PHI

   Designation of a security official who is responsible for
    developing and implement its security policies and procedures
Electronic confidentiality protections
                       Keep passwords and
                        other security
                        features that restrict
                        access to your
                        computer private
                       Never share
                        password access or
                        log in to the health
                        information system
                        using a borrowed
                        credential
More steps for protecting
         electronic information
   Point computer screen away from the public
   Never walk away from your computer with
    PHI up and in view of a passerby
   Never remove computer equipment, disks, or
    software unless instructed to do so by your
    supervisor
   Never send confidential patient information in
    an e-mail unless it is encrypted
   Always double-check the address line of an
    email before you send it.
Penalties for Breaches

Breaches of the HIPAA Privacy and Security Rules have
serious ramifications for all involved. In addition to
sanctions imposed by this organization, such breaches
may result in civil and criminal penalties.

   Statutory and regulatory penalties for breaches may
                         include:

Civil: $50,000 per incident, up to $1.5 million per calendar
year for violations that are not corrected

Criminal: $50,000 to $250,000 in fines and up to 10 years in
prison

In addition, institutions that fail to correct a HIPAA violation
may be fined up to $50,000 per violation.
Best Practice Reminders

   DO keep computer sign-on codes and passwords secret, and DO NOT allow unauthorized
   persons access to your computer. Also, use locked screensavers for added privacy.
   DO keep notes, files, memory sticks, and computers in a secure place, and be careful to NOT
   leave them in open areas outside your workplace, such as a library, cafeteria, or airport.
   DO NOT place PHI or PII on a mobile device without required approval. DO encrypt mobile
   devices that contain PHI or PII.
   DO hold discussions of PHI in private areas and for job-related reasons only. Also, be aware of
   places where others might overhear conversations, such as in reception areas.
   DO make certain when mailing documents that no sensitive information is shown on postcards or
   through envelope windows, and that envelopes are closed securely.
   DO NOT use unsealed campus mail envelopes when sending sensitive information to another
   employee.
   DO follow procedures for the proper disposal of sensitive information, such as shredding
   documents or using locked recycling drop boxes.
   When sending an e-mail, DO NOT include PHI or other sensitive information such as Social
   Security numbers, unless you have the proper written approval to store the information and
   encrypted your computer or e-mail.

(UNC, 2013)
References
HIPAA (n.d.) HIPAA training handbook for the healthcare staff: An
    introduction to confidentiality and privacy under HIPAA. Retrieved from
    website: http://www.regalmed.com/pdfs/HIPAA_Handbook.pdf

Kongstvedt, P.R. (2007). Essentials of managed health care (5th ed.). MA:
    Jones and Bartlett Publishers.

U.S. Department of Health & Human Services (2012). Health Information
      Privacy. Retrieved form U.S. Department of Health and Human Services
      website:
      http://www.hhs.gov/ocr/privacy/hipaa/understanding/consumers/ind
      ex.html

University of North Carolina (UNC) (2013). HIPAA, privacy, & security.
     Retrieved from website:
     http://www.unc.edu/hipaa/Annual%20HIPAA%20Training%20current.p
     df

Weitere ähnliche Inhalte

Was ist angesagt?

Patients’ privacy and confidentiality
Patients’ privacy and confidentialityPatients’ privacy and confidentiality
Patients’ privacy and confidentialitybernardsanch
 
Confidentiality
ConfidentialityConfidentiality
ConfidentialityDeniseMHA
 
Healthcare confidentiality training.2013bev
Healthcare confidentiality training.2013bevHealthcare confidentiality training.2013bev
Healthcare confidentiality training.2013bevblk70130
 
Confidentiality
ConfidentialityConfidentiality
ConfidentialityLLSS64
 
Confidentiality in the Workplace
Confidentiality in the WorkplaceConfidentiality in the Workplace
Confidentiality in the Workplacesalvarez63
 
Privacy & confedentiality
Privacy & confedentialityPrivacy & confedentiality
Privacy & confedentialityHemang Patel
 
Healthcare Information Privacy & Confidentiality: How To Work Very Well With ...
Healthcare Information Privacy & Confidentiality: How To Work Very Well With ...Healthcare Information Privacy & Confidentiality: How To Work Very Well With ...
Healthcare Information Privacy & Confidentiality: How To Work Very Well With ...Nawanan Theera-Ampornpunt
 
Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentialityptamayo1958
 
The importance of confidentiality
The importance of confidentialityThe importance of confidentiality
The importance of confidentialityswilson0050
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippamaggie_Platt
 
Confidentiality
ConfidentialityConfidentiality
Confidentialityblutoothe
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA BasicsKarna *
 
Confidentiality and Data Protection
Confidentiality and Data ProtectionConfidentiality and Data Protection
Confidentiality and Data ProtectionEd Horowicz
 
Confidentiality New Employee Training (First-Week)
Confidentiality New Employee Training (First-Week)Confidentiality New Employee Training (First-Week)
Confidentiality New Employee Training (First-Week)ChildrensHomeIllinois
 
Confidentiality in the workplace (1)
Confidentiality in the workplace (1)Confidentiality in the workplace (1)
Confidentiality in the workplace (1)lei luna
 
Patient Privacy and Safety in Healthcare
Patient Privacy and Safety in HealthcarePatient Privacy and Safety in Healthcare
Patient Privacy and Safety in HealthcareQueen Myers
 
Lecture 13 privacy, confidentiality and medical records
Lecture 13 privacy, confidentiality and medical recordsLecture 13 privacy, confidentiality and medical records
Lecture 13 privacy, confidentiality and medical recordsDr Ghaiath Hussein
 

Was ist angesagt? (20)

Patients’ privacy and confidentiality
Patients’ privacy and confidentialityPatients’ privacy and confidentiality
Patients’ privacy and confidentiality
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Healthcare confidentiality training.2013bev
Healthcare confidentiality training.2013bevHealthcare confidentiality training.2013bev
Healthcare confidentiality training.2013bev
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Confidentiality in the Workplace
Confidentiality in the WorkplaceConfidentiality in the Workplace
Confidentiality in the Workplace
 
Privacy & confedentiality
Privacy & confedentialityPrivacy & confedentiality
Privacy & confedentiality
 
Healthcare Information Privacy & Confidentiality: How To Work Very Well With ...
Healthcare Information Privacy & Confidentiality: How To Work Very Well With ...Healthcare Information Privacy & Confidentiality: How To Work Very Well With ...
Healthcare Information Privacy & Confidentiality: How To Work Very Well With ...
 
Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentiality
 
The importance of confidentiality
The importance of confidentialityThe importance of confidentiality
The importance of confidentiality
 
Hippa
HippaHippa
Hippa
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippa
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA Basics
 
Confidentiality and Data Protection
Confidentiality and Data ProtectionConfidentiality and Data Protection
Confidentiality and Data Protection
 
Hipaa slideshow
Hipaa slideshowHipaa slideshow
Hipaa slideshow
 
Confidentiality New Employee Training (First-Week)
Confidentiality New Employee Training (First-Week)Confidentiality New Employee Training (First-Week)
Confidentiality New Employee Training (First-Week)
 
Confidentiality in the workplace (1)
Confidentiality in the workplace (1)Confidentiality in the workplace (1)
Confidentiality in the workplace (1)
 
Patient Privacy and Safety in Healthcare
Patient Privacy and Safety in HealthcarePatient Privacy and Safety in Healthcare
Patient Privacy and Safety in Healthcare
 
Lecture 13 privacy, confidentiality and medical records
Lecture 13 privacy, confidentiality and medical recordsLecture 13 privacy, confidentiality and medical records
Lecture 13 privacy, confidentiality and medical records
 

Andere mochten auch

Confidentiality in Healthcare
Confidentiality in HealthcareConfidentiality in Healthcare
Confidentiality in Healthcarekmasterson
 
Induction Slideshow Privacy And Confidentiality
Induction Slideshow  Privacy And ConfidentialityInduction Slideshow  Privacy And Confidentiality
Induction Slideshow Privacy And ConfidentialityD S
 
Protecting patient privacy and confidentiality
Protecting patient privacy and confidentialityProtecting patient privacy and confidentiality
Protecting patient privacy and confidentialityTiffany Cochran
 
Medico legal case
Medico legal caseMedico legal case
Medico legal caseNc Das
 

Andere mochten auch (6)

Confidentiality in Healthcare
Confidentiality in HealthcareConfidentiality in Healthcare
Confidentiality in Healthcare
 
Induction Slideshow Privacy And Confidentiality
Induction Slideshow  Privacy And ConfidentialityInduction Slideshow  Privacy And Confidentiality
Induction Slideshow Privacy And Confidentiality
 
Protecting patient privacy and confidentiality
Protecting patient privacy and confidentialityProtecting patient privacy and confidentiality
Protecting patient privacy and confidentiality
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Medical ethics
Medical ethicsMedical ethics
Medical ethics
 
Medico legal case
Medico legal caseMedico legal case
Medico legal case
 

Ähnlich wie Upholding confidentiality

Confidentiality
ConfidentialityConfidentiality
Confidentialityloletawoo
 
Hippa final JU nursing informatics
Hippa final JU nursing informaticsHippa final JU nursing informatics
Hippa final JU nursing informaticskmcanty
 
Patient Confidentiality Training Presentation (1)
Patient Confidentiality Training Presentation (1)Patient Confidentiality Training Presentation (1)
Patient Confidentiality Training Presentation (1)DonnaShockley
 
Patient confidentiality MHA 690
Patient confidentiality MHA 690Patient confidentiality MHA 690
Patient confidentiality MHA 690AMSIMM9932
 
Wk1 discussion 2
Wk1 discussion 2Wk1 discussion 2
Wk1 discussion 2jodimw
 
Confidentiality
ConfidentialityConfidentiality
ConfidentialityRamiAboali
 
Hipaa basics pp2
Hipaa basics pp2Hipaa basics pp2
Hipaa basics pp2martykoepke
 
Hippa training for healthcare employees
Hippa training for healthcare employeesHippa training for healthcare employees
Hippa training for healthcare employeesaminahallen
 
Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)bholmes
 
2017 HIPAA Clinical Research Training
2017 HIPAA Clinical Research Training2017 HIPAA Clinical Research Training
2017 HIPAA Clinical Research TrainingCynthia Holland
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013LeRoy Ulibarri
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013LeRoy Ulibarri
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013LeRoy Ulibarri
 
Sylvia hipaa powerpoint presentation 2010(1)
Sylvia hipaa powerpoint presentation 2010(1)Sylvia hipaa powerpoint presentation 2010(1)
Sylvia hipaa powerpoint presentation 2010(1)bholmes
 
Mha690 wk 1 fletcher
Mha690 wk 1   fletcherMha690 wk 1   fletcher
Mha690 wk 1 fletcherEmed32
 
Hipaa education
Hipaa educationHipaa education
Hipaa educationeklundc
 
Marc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentationMarc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentationMarcEtienne6
 
Confidentiality 9.26.13
Confidentiality 9.26.13Confidentiality 9.26.13
Confidentiality 9.26.13pneville0629
 
HIPAA Compliance For Small Practices
HIPAA Compliance For Small PracticesHIPAA Compliance For Small Practices
HIPAA Compliance For Small PracticesNisos Health
 
Tiffany hall mha 690 week 1 discussion 2
Tiffany hall mha 690 week 1   discussion 2Tiffany hall mha 690 week 1   discussion 2
Tiffany hall mha 690 week 1 discussion 2tiffhall
 

Ähnlich wie Upholding confidentiality (20)

Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Hippa final JU nursing informatics
Hippa final JU nursing informaticsHippa final JU nursing informatics
Hippa final JU nursing informatics
 
Patient Confidentiality Training Presentation (1)
Patient Confidentiality Training Presentation (1)Patient Confidentiality Training Presentation (1)
Patient Confidentiality Training Presentation (1)
 
Patient confidentiality MHA 690
Patient confidentiality MHA 690Patient confidentiality MHA 690
Patient confidentiality MHA 690
 
Wk1 discussion 2
Wk1 discussion 2Wk1 discussion 2
Wk1 discussion 2
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Hipaa basics pp2
Hipaa basics pp2Hipaa basics pp2
Hipaa basics pp2
 
Hippa training for healthcare employees
Hippa training for healthcare employeesHippa training for healthcare employees
Hippa training for healthcare employees
 
Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)
 
2017 HIPAA Clinical Research Training
2017 HIPAA Clinical Research Training2017 HIPAA Clinical Research Training
2017 HIPAA Clinical Research Training
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
Sylvia hipaa powerpoint presentation 2010(1)
Sylvia hipaa powerpoint presentation 2010(1)Sylvia hipaa powerpoint presentation 2010(1)
Sylvia hipaa powerpoint presentation 2010(1)
 
Mha690 wk 1 fletcher
Mha690 wk 1   fletcherMha690 wk 1   fletcher
Mha690 wk 1 fletcher
 
Hipaa education
Hipaa educationHipaa education
Hipaa education
 
Marc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentationMarc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentation
 
Confidentiality 9.26.13
Confidentiality 9.26.13Confidentiality 9.26.13
Confidentiality 9.26.13
 
HIPAA Compliance For Small Practices
HIPAA Compliance For Small PracticesHIPAA Compliance For Small Practices
HIPAA Compliance For Small Practices
 
Tiffany hall mha 690 week 1 discussion 2
Tiffany hall mha 690 week 1   discussion 2Tiffany hall mha 690 week 1   discussion 2
Tiffany hall mha 690 week 1 discussion 2
 

Kürzlich hochgeladen

UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxUmeshTimilsina1
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 

Kürzlich hochgeladen (20)

UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 

Upholding confidentiality

  • 1. Upholding Confidentiality It is your ethical responsibility Theresa Tapley MHA690: Health Care Capstone Ashford University Dr. David Cole April 23, 2013
  • 2. Objectives  Understanding of HIPAA  Ethical Responsibility to keep each and every patient’s PHI confidential  Patient Privacy Rule and Security Rules  Identification of what PHI is  Ways to protect PHI  Tips for electronic confidentiality protections  Consequences if confidentiality or PHI mishandlement
  • 3. What is Health Insurance Portability and Accountability Act (HIPAA)?  HIPPA is a federal law that gives an individual the right of protection of their personal health information (PHI).  PHI includes all medical and personal information and must be protected whether communication is verbal, written, or electronic. (U.S. Department HHS, 2012)
  • 4. Forms of Sensitive Information Sensitive Information exists in various forms Printed Spoken Electronic It is the responsibility of every employee to protect the privacy and security of sensitive information in ALL forms
  • 5. What Information is Considered Confidential and must be Protected?  Personal billing information  All medical records  Conversations between physician and other medical staff regarding a patient  Information about a patient within their Insurance carrier’s database
  • 6. Patient Privacy Rule Rights  The right to see and obtain a copy of their health record  The right to have corrections added to their personal health record  The right to receive notice about how their health information will be used or shared for certain purposes  The right to get a report of when and why their health information was shared  The right to file a complaint with the provider or health insurer  The right to file a complaint with the U. S. Government
  • 7. Personal Health Information How to keep it confidential  Never leave medical records where others can gain access to them  PHI should be guarded and kept confidential, shared only with healthcare providers involved in their healthcare  PHI is confidential and should not be viewed on paper or on computer by unauthorized staff
  • 8. Ways to Protect Confidentiality of PHI  PHI should only be shared with other healthcare professionals directly involved in an individual’s care  Records are kept locked and only people with a need to see information about patients have access to them  Employees who use computerized patient records to not leave their computers logged in to the patient information system while they are not at their workstations. Computer screens containing patient information are turned away from the view of the public or people passing by.
  • 9. More Ways to Protect Confidentiality of PHI  Posted or written patient information maintained in work areas such as nurses’ stations or front desk is kept covered from the public.  Discussions about patient care are kept private to reduce the likelihood that those who do not need to know will overhear.  Electronic records are kept secure, and the facility monitors who gains access to records to ensure that they are being used appropriately.  Paper records are always shredded or placed in closed receptacles for delivery to a company that destroys records for the facility. They must never be left in the garbage.
  • 10. Understanding the Security Rule  Specifies a series of administrative, physical, and technical safeguards for covered entities to use to assure the confidentiality, integrity, and availability of electronic protected health information  The Security Rule defines “confidentiality” to mean that e-PHI is not available or disclosed to unauthorized persons. The Security Rule's confidentiality requirements support the Privacy Rule's prohibitions against improper uses and disclosures of PHI  The Security rule also promotes the two additional goals of maintaining the integrity and availability of e-PHI  Designation of a security official who is responsible for developing and implement its security policies and procedures
  • 11. Electronic confidentiality protections  Keep passwords and other security features that restrict access to your computer private  Never share password access or log in to the health information system using a borrowed credential
  • 12. More steps for protecting electronic information  Point computer screen away from the public  Never walk away from your computer with PHI up and in view of a passerby  Never remove computer equipment, disks, or software unless instructed to do so by your supervisor  Never send confidential patient information in an e-mail unless it is encrypted  Always double-check the address line of an email before you send it.
  • 13. Penalties for Breaches Breaches of the HIPAA Privacy and Security Rules have serious ramifications for all involved. In addition to sanctions imposed by this organization, such breaches may result in civil and criminal penalties. Statutory and regulatory penalties for breaches may include: Civil: $50,000 per incident, up to $1.5 million per calendar year for violations that are not corrected Criminal: $50,000 to $250,000 in fines and up to 10 years in prison In addition, institutions that fail to correct a HIPAA violation may be fined up to $50,000 per violation.
  • 14. Best Practice Reminders  DO keep computer sign-on codes and passwords secret, and DO NOT allow unauthorized  persons access to your computer. Also, use locked screensavers for added privacy.  DO keep notes, files, memory sticks, and computers in a secure place, and be careful to NOT  leave them in open areas outside your workplace, such as a library, cafeteria, or airport.  DO NOT place PHI or PII on a mobile device without required approval. DO encrypt mobile  devices that contain PHI or PII.  DO hold discussions of PHI in private areas and for job-related reasons only. Also, be aware of  places where others might overhear conversations, such as in reception areas.  DO make certain when mailing documents that no sensitive information is shown on postcards or  through envelope windows, and that envelopes are closed securely.  DO NOT use unsealed campus mail envelopes when sending sensitive information to another  employee.  DO follow procedures for the proper disposal of sensitive information, such as shredding  documents or using locked recycling drop boxes.  When sending an e-mail, DO NOT include PHI or other sensitive information such as Social  Security numbers, unless you have the proper written approval to store the information and  encrypted your computer or e-mail. (UNC, 2013)
  • 15. References HIPAA (n.d.) HIPAA training handbook for the healthcare staff: An introduction to confidentiality and privacy under HIPAA. Retrieved from website: http://www.regalmed.com/pdfs/HIPAA_Handbook.pdf Kongstvedt, P.R. (2007). Essentials of managed health care (5th ed.). MA: Jones and Bartlett Publishers. U.S. Department of Health & Human Services (2012). Health Information Privacy. Retrieved form U.S. Department of Health and Human Services website: http://www.hhs.gov/ocr/privacy/hipaa/understanding/consumers/ind ex.html University of North Carolina (UNC) (2013). HIPAA, privacy, & security. Retrieved from website: http://www.unc.edu/hipaa/Annual%20HIPAA%20Training%20current.p df