SlideShare ist ein Scribd-Unternehmen logo
1 von 8
HIPPA
YOUR RESPONSIBITY IN THE
WORKPLACE
What Is The HIPPA Privacy
Rule?
   The privacy rule creates national standards to
    protect patient medical records and personal
    health information. The rule:
    gives patients control over their health
    information
   Sets limitations on the use and release of
    health records and information
   Establishes safeguards that providers must
    follow to protect patient privacy
Protected Health Information
   HIPPA protects any identifiable information
    related to the past, present, or future physical
    or metal health of a person
   In any form or medium (oral, written, or
    electronic)
   Examples of protected information include:
    zip codes, telephone numbers, fax numbers,
    e-mail addresses, pictures, dates of service,
    patient history, discharge summary, phone
    notes, inpatient or outpatient progress notes,
    census, and allergies.
Who Is Authorized To See
protected Health Information?
 Health  care providers who are directly
  involved in providing treatment, payment,
  or involved with health operations.
 Efforts must be made to limit protected
  health information to the minimum
  necessary to accomplish the intended
  purpose of the use, disclosure, or request.
HIPPA Rights Guaranteed To
Patients
 Patients can:
 See their records or get a copy
 Request amendments to their records if
  they feel the records are incorrect
 Request a list of who their records have
  been disclosed to
 Complain of privacy problems
Provider Rights
 Use patient information for treatment,
  payment, and health care operations
 Disclose information to family members or
  other patient representatives if the patient
  cannot speak for himself
Fines And Penalties
 Civil: $100 each violation up to $25,000
  per person per year
 Criminal: Knowing – up to $50,000, 1 year
  in prison
 Under false pretences - $100,000 , 5 years
  in prison
 With malice or personal gain - $250,000, 10
  years in prison
How To Safeguard Protected
Health Information
   Avoid discussion about patients in public areas
   Do not leave messages on an answering machine
    concerning a patient’s condition
   Secure storage and transportation of patient
    information
   Display precautions such as public view of
    computer screens
   Log off computers when away from work station
   Records are locked except to people who need
    access to information
   If you have any questions ask the company’s
    safety officer.

Weitere ähnliche Inhalte

Was ist angesagt?

HIPAA and Information Technology
HIPAA and Information TechnologyHIPAA and Information Technology
HIPAA and Information TechnologyRhess1967
 
Hipaa and information technology pp
Hipaa and information technology ppHipaa and information technology pp
Hipaa and information technology ppRhess1967
 
Hippa training for healthcare employees
Hippa training for healthcare employeesHippa training for healthcare employees
Hippa training for healthcare employeesaminahallen
 
Patient confidentiality mha690
Patient confidentiality mha690Patient confidentiality mha690
Patient confidentiality mha690gquinlan29
 
Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentialityptamayo1958
 
Hippa training for healthcare employees
Hippa training for healthcare employeesHippa training for healthcare employees
Hippa training for healthcare employeesaminahallen
 
10 Legal Mistakes Healthcare Providers Must Avoid
10 Legal Mistakes Healthcare Providers Must Avoid10 Legal Mistakes Healthcare Providers Must Avoid
10 Legal Mistakes Healthcare Providers Must Avoidmosmedicalreview
 
Hippa training on confidentiality
Hippa training on confidentialityHippa training on confidentiality
Hippa training on confidentialitycraig45365
 
香港六合彩
香港六合彩香港六合彩
香港六合彩shujia
 
Securing health information
Securing health informationSecuring health information
Securing health informationDarla Moore
 
THCS Workforce HIPAA Training
THCS Workforce HIPAA TrainingTHCS Workforce HIPAA Training
THCS Workforce HIPAA Trainingkerbertx
 
Patients Privacy and Confidentiality
Patients Privacy and ConfidentialityPatients Privacy and Confidentiality
Patients Privacy and ConfidentialityOluseyi Ilesanmi
 
Patient privacy & confidentiality training
Patient privacy & confidentiality trainingPatient privacy & confidentiality training
Patient privacy & confidentiality trainingKatie McCaslin
 

Was ist angesagt? (20)

Mha 690
Mha 690Mha 690
Mha 690
 
HIPAA and Information Technology
HIPAA and Information TechnologyHIPAA and Information Technology
HIPAA and Information Technology
 
Hipaa and information technology pp
Hipaa and information technology ppHipaa and information technology pp
Hipaa and information technology pp
 
Week 1 discussion 2
Week 1 discussion 2Week 1 discussion 2
Week 1 discussion 2
 
Hippa training for healthcare employees
Hippa training for healthcare employeesHippa training for healthcare employees
Hippa training for healthcare employees
 
HIPAA
HIPAAHIPAA
HIPAA
 
Patient confidentiality mha690
Patient confidentiality mha690Patient confidentiality mha690
Patient confidentiality mha690
 
Hippa 2021
Hippa 2021Hippa 2021
Hippa 2021
 
Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentiality
 
HIPAA
HIPAAHIPAA
HIPAA
 
Hippa training for healthcare employees
Hippa training for healthcare employeesHippa training for healthcare employees
Hippa training for healthcare employees
 
HIPAA
HIPAAHIPAA
HIPAA
 
10 Legal Mistakes Healthcare Providers Must Avoid
10 Legal Mistakes Healthcare Providers Must Avoid10 Legal Mistakes Healthcare Providers Must Avoid
10 Legal Mistakes Healthcare Providers Must Avoid
 
Hippa training on confidentiality
Hippa training on confidentialityHippa training on confidentiality
Hippa training on confidentiality
 
香港六合彩
香港六合彩香港六合彩
香港六合彩
 
HIPAA Complaince
HIPAA ComplainceHIPAA Complaince
HIPAA Complaince
 
Securing health information
Securing health informationSecuring health information
Securing health information
 
THCS Workforce HIPAA Training
THCS Workforce HIPAA TrainingTHCS Workforce HIPAA Training
THCS Workforce HIPAA Training
 
Patients Privacy and Confidentiality
Patients Privacy and ConfidentialityPatients Privacy and Confidentiality
Patients Privacy and Confidentiality
 
Patient privacy & confidentiality training
Patient privacy & confidentiality trainingPatient privacy & confidentiality training
Patient privacy & confidentiality training
 

Ähnlich wie Hippa

Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentialityLily Isaacson
 
Patient Confidentiality Training Presentation (1)
Patient Confidentiality Training Presentation (1)Patient Confidentiality Training Presentation (1)
Patient Confidentiality Training Presentation (1)DonnaShockley
 
HIPAA INSERVICE 2017
HIPAA INSERVICE 2017 HIPAA INSERVICE 2017
HIPAA INSERVICE 2017 Meg Oser
 
Hipaa basics pp2
Hipaa basics pp2Hipaa basics pp2
Hipaa basics pp2martykoepke
 
Tiffany hall mha 690 week 1 discussion 2
Tiffany hall mha 690 week 1   discussion 2Tiffany hall mha 690 week 1   discussion 2
Tiffany hall mha 690 week 1 discussion 2tiffhall
 
Tiffany hall mha 690 week 1 discussion 2
Tiffany hall mha 690 week 1   discussion 2Tiffany hall mha 690 week 1   discussion 2
Tiffany hall mha 690 week 1 discussion 2tiffhall
 
Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)bholmes
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA BasicsKarna *
 
Sylvia hipaa powerpoint presentation 2010(1)
Sylvia hipaa powerpoint presentation 2010(1)Sylvia hipaa powerpoint presentation 2010(1)
Sylvia hipaa powerpoint presentation 2010(1)bholmes
 
HIPAA and RHIOs
HIPAA and RHIOsHIPAA and RHIOs
HIPAA and RHIOsnobumoto
 
Week 1 discussion 2 - HIPAA Training
Week 1 discussion 2 - HIPAA TrainingWeek 1 discussion 2 - HIPAA Training
Week 1 discussion 2 - HIPAA TrainingKristen Tereo
 
Marc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentationMarc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentationMarcEtienne6
 
Health care confidentiality and privacy
Health care confidentiality and privacyHealth care confidentiality and privacy
Health care confidentiality and privacysawanda
 
Healthcare Compliance and Privacy/Security Training by UCONN
Healthcare Compliance and Privacy/Security Training by UCONNHealthcare Compliance and Privacy/Security Training by UCONN
Healthcare Compliance and Privacy/Security Training by UCONNAtlantic Training, LLC.
 
Training manual point
Training manual pointTraining manual point
Training manual pointchdafe1253
 
Mha 690 week one discussion ii
Mha 690 week one discussion iiMha 690 week one discussion ii
Mha 690 week one discussion iibeleza1669
 
Mha 690 week one discussion ii
Mha 690 week one discussion iiMha 690 week one discussion ii
Mha 690 week one discussion iibeleza1669
 

Ähnlich wie Hippa (20)

Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentiality
 
Patient Confidentiality Training Presentation (1)
Patient Confidentiality Training Presentation (1)Patient Confidentiality Training Presentation (1)
Patient Confidentiality Training Presentation (1)
 
HIPAA INSERVICE 2017
HIPAA INSERVICE 2017 HIPAA INSERVICE 2017
HIPAA INSERVICE 2017
 
Hipaa inservice
Hipaa inserviceHipaa inservice
Hipaa inservice
 
Hipaa basics pp2
Hipaa basics pp2Hipaa basics pp2
Hipaa basics pp2
 
Tiffany hall mha 690 week 1 discussion 2
Tiffany hall mha 690 week 1   discussion 2Tiffany hall mha 690 week 1   discussion 2
Tiffany hall mha 690 week 1 discussion 2
 
Tiffany hall mha 690 week 1 discussion 2
Tiffany hall mha 690 week 1   discussion 2Tiffany hall mha 690 week 1   discussion 2
Tiffany hall mha 690 week 1 discussion 2
 
Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)
 
HIPAA Training by UCSD
HIPAA Training by UCSDHIPAA Training by UCSD
HIPAA Training by UCSD
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA Basics
 
Sylvia hipaa powerpoint presentation 2010(1)
Sylvia hipaa powerpoint presentation 2010(1)Sylvia hipaa powerpoint presentation 2010(1)
Sylvia hipaa powerpoint presentation 2010(1)
 
HIPAA and RHIOs
HIPAA and RHIOsHIPAA and RHIOs
HIPAA and RHIOs
 
Week 1 discussion 2 - HIPAA Training
Week 1 discussion 2 - HIPAA TrainingWeek 1 discussion 2 - HIPAA Training
Week 1 discussion 2 - HIPAA Training
 
Marc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentationMarc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentation
 
HIPAA
HIPAAHIPAA
HIPAA
 
Health care confidentiality and privacy
Health care confidentiality and privacyHealth care confidentiality and privacy
Health care confidentiality and privacy
 
Healthcare Compliance and Privacy/Security Training by UCONN
Healthcare Compliance and Privacy/Security Training by UCONNHealthcare Compliance and Privacy/Security Training by UCONN
Healthcare Compliance and Privacy/Security Training by UCONN
 
Training manual point
Training manual pointTraining manual point
Training manual point
 
Mha 690 week one discussion ii
Mha 690 week one discussion iiMha 690 week one discussion ii
Mha 690 week one discussion ii
 
Mha 690 week one discussion ii
Mha 690 week one discussion iiMha 690 week one discussion ii
Mha 690 week one discussion ii
 

Kürzlich hochgeladen

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Hippa

  • 2. What Is The HIPPA Privacy Rule?  The privacy rule creates national standards to protect patient medical records and personal health information. The rule:  gives patients control over their health information  Sets limitations on the use and release of health records and information  Establishes safeguards that providers must follow to protect patient privacy
  • 3. Protected Health Information  HIPPA protects any identifiable information related to the past, present, or future physical or metal health of a person  In any form or medium (oral, written, or electronic)  Examples of protected information include: zip codes, telephone numbers, fax numbers, e-mail addresses, pictures, dates of service, patient history, discharge summary, phone notes, inpatient or outpatient progress notes, census, and allergies.
  • 4. Who Is Authorized To See protected Health Information?  Health care providers who are directly involved in providing treatment, payment, or involved with health operations.  Efforts must be made to limit protected health information to the minimum necessary to accomplish the intended purpose of the use, disclosure, or request.
  • 5. HIPPA Rights Guaranteed To Patients  Patients can:  See their records or get a copy  Request amendments to their records if they feel the records are incorrect  Request a list of who their records have been disclosed to  Complain of privacy problems
  • 6. Provider Rights  Use patient information for treatment, payment, and health care operations  Disclose information to family members or other patient representatives if the patient cannot speak for himself
  • 7. Fines And Penalties  Civil: $100 each violation up to $25,000 per person per year  Criminal: Knowing – up to $50,000, 1 year in prison  Under false pretences - $100,000 , 5 years in prison  With malice or personal gain - $250,000, 10 years in prison
  • 8. How To Safeguard Protected Health Information  Avoid discussion about patients in public areas  Do not leave messages on an answering machine concerning a patient’s condition  Secure storage and transportation of patient information  Display precautions such as public view of computer screens  Log off computers when away from work station  Records are locked except to people who need access to information  If you have any questions ask the company’s safety officer.