SlideShare uma empresa Scribd logo
1 de 15
Upholding
Confidentiality
It is your ethical responsibility
       Theresa Tapley
MHA690: Health Care Capstone
     Ashford University
       Dr. David Cole
        April 23, 2013
Objectives
 Understanding    of HIPAA
 Ethical Responsibility to keep each and
  every patient’s PHI confidential
 Patient Privacy Rule and Security Rules
 Identification of what PHI is
 Ways to protect PHI
 Tips for electronic confidentiality
  protections
 Consequences if confidentiality or PHI
  mishandlement
What is Health Insurance Portability and
     Accountability Act (HIPAA)?
 HIPPA  is a federal law that gives an
  individual the right of protection of their
  personal health information (PHI).
 PHI includes all medical and personal
  information and must be protected
  whether communication is
  verbal, written, or electronic.

(U.S. Department HHS, 2012)
Forms of Sensitive Information
          Sensitive Information exists in various forms




Printed                  Spoken                Electronic

       It is the responsibility of every employee to
 protect the privacy and security of sensitive information
                         in ALL forms
What Information is Considered Confidential
         and must be Protected?
                          Personal billing information

                          All medical records

                          Conversations between
                           physician and other
                           medical staff regarding a
                           patient

                          Information about a
                           patient within their
                           Insurance carrier’s
                           database
Patient Privacy Rule Rights
            The right to see and obtain a copy of
             their health record

            The right to have corrections added to
             their personal health record

            The right to receive notice about how
             their health information will be used or
             shared for certain purposes

            The right to get a report of when and
             why their health information was shared

            The right to file a complaint with the
             provider or health insurer

            The right to file a complaint with the U. S.
             Government
Personal Health Information
How to keep it confidential
                 Never leave medical
                  records where others can
                  gain access to them

                 PHI should be guarded and
                  kept confidential, shared
                  only with healthcare
                  providers involved in their
                  healthcare

                 PHI is confidential and
                  should not be viewed on
                  paper or on computer by
                  unauthorized staff
Ways to Protect Confidentiality of PHI
   PHI should only be shared with other healthcare
    professionals directly involved in an individual’s
    care
    Records are kept locked and only people with a
    need to see information about patients have
    access to them
   Employees who use computerized patient records
    to not leave their computers logged in to the
    patient information system while they are not at
    their workstations. Computer screens containing
    patient information are turned away from the view
    of the public or people passing by.
More Ways to Protect Confidentiality of PHI
   Posted or written patient information maintained in
    work areas such as nurses’ stations or front desk is
    kept covered from the public.
   Discussions about patient care are kept private to
    reduce the likelihood that those who do not need
    to know will overhear.
   Electronic records are kept secure, and the facility
    monitors who gains access to records to ensure
    that they are being used appropriately.
   Paper records are always shredded or placed in
    closed receptacles for delivery to a company that
    destroys records for the facility. They must never
    be left in the garbage.
Understanding the Security Rule
   Specifies a series of administrative, physical, and technical
    safeguards for covered entities to use to assure the
    confidentiality, integrity, and availability of electronic
    protected health information

   The Security Rule defines “confidentiality” to mean that e-PHI is
    not available or disclosed to unauthorized persons. The Security
    Rule's confidentiality requirements support the Privacy Rule's
    prohibitions against improper uses and disclosures of PHI

   The Security rule also promotes the two additional goals of
    maintaining the integrity and availability of e-PHI

   Designation of a security official who is responsible for
    developing and implement its security policies and procedures
Electronic confidentiality protections
                       Keep passwords and
                        other security
                        features that restrict
                        access to your
                        computer private
                       Never share
                        password access or
                        log in to the health
                        information system
                        using a borrowed
                        credential
More steps for protecting
         electronic information
   Point computer screen away from the public
   Never walk away from your computer with
    PHI up and in view of a passerby
   Never remove computer equipment, disks, or
    software unless instructed to do so by your
    supervisor
   Never send confidential patient information in
    an e-mail unless it is encrypted
   Always double-check the address line of an
    email before you send it.
Penalties for Breaches

Breaches of the HIPAA Privacy and Security Rules have
serious ramifications for all involved. In addition to
sanctions imposed by this organization, such breaches
may result in civil and criminal penalties.

   Statutory and regulatory penalties for breaches may
                         include:

Civil: $50,000 per incident, up to $1.5 million per calendar
year for violations that are not corrected

Criminal: $50,000 to $250,000 in fines and up to 10 years in
prison

In addition, institutions that fail to correct a HIPAA violation
may be fined up to $50,000 per violation.
Best Practice Reminders

   DO keep computer sign-on codes and passwords secret, and DO NOT allow unauthorized
   persons access to your computer. Also, use locked screensavers for added privacy.
   DO keep notes, files, memory sticks, and computers in a secure place, and be careful to NOT
   leave them in open areas outside your workplace, such as a library, cafeteria, or airport.
   DO NOT place PHI or PII on a mobile device without required approval. DO encrypt mobile
   devices that contain PHI or PII.
   DO hold discussions of PHI in private areas and for job-related reasons only. Also, be aware of
   places where others might overhear conversations, such as in reception areas.
   DO make certain when mailing documents that no sensitive information is shown on postcards or
   through envelope windows, and that envelopes are closed securely.
   DO NOT use unsealed campus mail envelopes when sending sensitive information to another
   employee.
   DO follow procedures for the proper disposal of sensitive information, such as shredding
   documents or using locked recycling drop boxes.
   When sending an e-mail, DO NOT include PHI or other sensitive information such as Social
   Security numbers, unless you have the proper written approval to store the information and
   encrypted your computer or e-mail.

(UNC, 2013)
References
HIPAA (n.d.) HIPAA training handbook for the healthcare staff: An
    introduction to confidentiality and privacy under HIPAA. Retrieved from
    website: http://www.regalmed.com/pdfs/HIPAA_Handbook.pdf

Kongstvedt, P.R. (2007). Essentials of managed health care (5th ed.). MA:
    Jones and Bartlett Publishers.

U.S. Department of Health & Human Services (2012). Health Information
      Privacy. Retrieved form U.S. Department of Health and Human Services
      website:
      http://www.hhs.gov/ocr/privacy/hipaa/understanding/consumers/ind
      ex.html

University of North Carolina (UNC) (2013). HIPAA, privacy, & security.
     Retrieved from website:
     http://www.unc.edu/hipaa/Annual%20HIPAA%20Training%20current.p
     df

Mais conteúdo relacionado

Mais procurados

Presentation hippa
Presentation hippaPresentation hippa
Presentation hippamaggie_Platt
 
Patients’ privacy and confidentiality
Patients’ privacy and confidentialityPatients’ privacy and confidentiality
Patients’ privacy and confidentialitybernardsanch
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA BasicsKarna *
 
Health care confidentiality and privacy
Health care confidentiality and privacyHealth care confidentiality and privacy
Health care confidentiality and privacysawanda
 
Confidentiality in the Workplace
Confidentiality in the WorkplaceConfidentiality in the Workplace
Confidentiality in the Workplacesalvarez63
 
Confidentiality
Confidentiality Confidentiality
Confidentiality pcsamuels10
 
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)Sanjeev Bharwan
 
Confidentiality New Employee Training (First-Week)
Confidentiality New Employee Training (First-Week)Confidentiality New Employee Training (First-Week)
Confidentiality New Employee Training (First-Week)ChildrensHomeIllinois
 
Privacy & confedentiality
Privacy & confedentialityPrivacy & confedentiality
Privacy & confedentialityHemang Patel
 
HIPAA - Understanding the Basics of Compliance
HIPAA - Understanding the Basics of ComplianceHIPAA - Understanding the Basics of Compliance
HIPAA - Understanding the Basics of ComplianceJay Hodes
 
Confidentiality in Healthcare
Confidentiality in HealthcareConfidentiality in Healthcare
Confidentiality in Healthcarekmasterson
 
Confidentiality
ConfidentialityConfidentiality
ConfidentialityDeniseMHA
 
HIPAA 101- What all Doctors NEED to know
HIPAA 101- What all Doctors NEED to knowHIPAA 101- What all Doctors NEED to know
HIPAA 101- What all Doctors NEED to knowCompliancy Group
 
Privacy and confidentiality
Privacy and confidentialityPrivacy and confidentiality
Privacy and confidentialityjaredbrady
 
The importance of confidentiality
The importance of confidentialityThe importance of confidentiality
The importance of confidentialityMOTHOM0556
 
HIPAA in 2023: Changes, Updates, and Best Practices
HIPAA in 2023: Changes, Updates, and Best PracticesHIPAA in 2023: Changes, Updates, and Best Practices
HIPAA in 2023: Changes, Updates, and Best PracticesConference Panel
 

Mais procurados (20)

Presentation hippa
Presentation hippaPresentation hippa
Presentation hippa
 
Patients’ privacy and confidentiality
Patients’ privacy and confidentialityPatients’ privacy and confidentiality
Patients’ privacy and confidentiality
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA Basics
 
Health care confidentiality and privacy
Health care confidentiality and privacyHealth care confidentiality and privacy
Health care confidentiality and privacy
 
Confidentiality in the Workplace
Confidentiality in the WorkplaceConfidentiality in the Workplace
Confidentiality in the Workplace
 
Confidentiality
Confidentiality Confidentiality
Confidentiality
 
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Confidentiality New Employee Training (First-Week)
Confidentiality New Employee Training (First-Week)Confidentiality New Employee Training (First-Week)
Confidentiality New Employee Training (First-Week)
 
Privacy & confedentiality
Privacy & confedentialityPrivacy & confedentiality
Privacy & confedentiality
 
Hipaa ppt june 6 2014
Hipaa ppt june 6 2014Hipaa ppt june 6 2014
Hipaa ppt june 6 2014
 
HIPAA - Understanding the Basics of Compliance
HIPAA - Understanding the Basics of ComplianceHIPAA - Understanding the Basics of Compliance
HIPAA - Understanding the Basics of Compliance
 
Confidentiality in Healthcare
Confidentiality in HealthcareConfidentiality in Healthcare
Confidentiality in Healthcare
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
HIPAA 101- What all Doctors NEED to know
HIPAA 101- What all Doctors NEED to knowHIPAA 101- What all Doctors NEED to know
HIPAA 101- What all Doctors NEED to know
 
Privacy and confidentiality
Privacy and confidentialityPrivacy and confidentiality
Privacy and confidentiality
 
HIPAA, PHI, & 42 CFR Part 2
HIPAA, PHI, & 42 CFR Part 2HIPAA, PHI, & 42 CFR Part 2
HIPAA, PHI, & 42 CFR Part 2
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
The importance of confidentiality
The importance of confidentialityThe importance of confidentiality
The importance of confidentiality
 
HIPAA in 2023: Changes, Updates, and Best Practices
HIPAA in 2023: Changes, Updates, and Best PracticesHIPAA in 2023: Changes, Updates, and Best Practices
HIPAA in 2023: Changes, Updates, and Best Practices
 

Destaque

Induction Slideshow Privacy And Confidentiality
Induction Slideshow  Privacy And ConfidentialityInduction Slideshow  Privacy And Confidentiality
Induction Slideshow Privacy And ConfidentialityD S
 
The importance of confidentiality
The importance of confidentialityThe importance of confidentiality
The importance of confidentialityswilson0050
 
Protecting patient privacy and confidentiality
Protecting patient privacy and confidentialityProtecting patient privacy and confidentiality
Protecting patient privacy and confidentialityTiffany Cochran
 
Medico legal case
Medico legal caseMedico legal case
Medico legal caseNc Das
 

Destaque (7)

Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Induction Slideshow Privacy And Confidentiality
Induction Slideshow  Privacy And ConfidentialityInduction Slideshow  Privacy And Confidentiality
Induction Slideshow Privacy And Confidentiality
 
The importance of confidentiality
The importance of confidentialityThe importance of confidentiality
The importance of confidentiality
 
Protecting patient privacy and confidentiality
Protecting patient privacy and confidentialityProtecting patient privacy and confidentiality
Protecting patient privacy and confidentiality
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Medical ethics
Medical ethicsMedical ethics
Medical ethics
 
Medico legal case
Medico legal caseMedico legal case
Medico legal case
 

Semelhante a Upholding confidentiality

Confidentiality
ConfidentialityConfidentiality
Confidentialityloletawoo
 
Hippa final JU nursing informatics
Hippa final JU nursing informaticsHippa final JU nursing informatics
Hippa final JU nursing informaticskmcanty
 
Patient Confidentiality Training Presentation (1)
Patient Confidentiality Training Presentation (1)Patient Confidentiality Training Presentation (1)
Patient Confidentiality Training Presentation (1)DonnaShockley
 
Patient confidentiality MHA 690
Patient confidentiality MHA 690Patient confidentiality MHA 690
Patient confidentiality MHA 690AMSIMM9932
 
Wk1 discussion 2
Wk1 discussion 2Wk1 discussion 2
Wk1 discussion 2jodimw
 
Confidentiality
ConfidentialityConfidentiality
ConfidentialityRamiAboali
 
Hipaa basics pp2
Hipaa basics pp2Hipaa basics pp2
Hipaa basics pp2martykoepke
 
Hippa training for healthcare employees
Hippa training for healthcare employeesHippa training for healthcare employees
Hippa training for healthcare employeesaminahallen
 
Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)bholmes
 
2017 HIPAA Clinical Research Training
2017 HIPAA Clinical Research Training2017 HIPAA Clinical Research Training
2017 HIPAA Clinical Research TrainingCynthia Holland
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013LeRoy Ulibarri
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013LeRoy Ulibarri
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013LeRoy Ulibarri
 
Sylvia hipaa powerpoint presentation 2010(1)
Sylvia hipaa powerpoint presentation 2010(1)Sylvia hipaa powerpoint presentation 2010(1)
Sylvia hipaa powerpoint presentation 2010(1)bholmes
 
Mha690 wk 1 fletcher
Mha690 wk 1   fletcherMha690 wk 1   fletcher
Mha690 wk 1 fletcherEmed32
 
Hipaa education
Hipaa educationHipaa education
Hipaa educationeklundc
 
Marc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentationMarc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentationMarcEtienne6
 
Confidentiality 9.26.13
Confidentiality 9.26.13Confidentiality 9.26.13
Confidentiality 9.26.13pneville0629
 
HIPAA Compliance For Small Practices
HIPAA Compliance For Small PracticesHIPAA Compliance For Small Practices
HIPAA Compliance For Small PracticesNisos Health
 
Tiffany hall mha 690 week 1 discussion 2
Tiffany hall mha 690 week 1   discussion 2Tiffany hall mha 690 week 1   discussion 2
Tiffany hall mha 690 week 1 discussion 2tiffhall
 

Semelhante a Upholding confidentiality (20)

Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Hippa final JU nursing informatics
Hippa final JU nursing informaticsHippa final JU nursing informatics
Hippa final JU nursing informatics
 
Patient Confidentiality Training Presentation (1)
Patient Confidentiality Training Presentation (1)Patient Confidentiality Training Presentation (1)
Patient Confidentiality Training Presentation (1)
 
Patient confidentiality MHA 690
Patient confidentiality MHA 690Patient confidentiality MHA 690
Patient confidentiality MHA 690
 
Wk1 discussion 2
Wk1 discussion 2Wk1 discussion 2
Wk1 discussion 2
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Hipaa basics pp2
Hipaa basics pp2Hipaa basics pp2
Hipaa basics pp2
 
Hippa training for healthcare employees
Hippa training for healthcare employeesHippa training for healthcare employees
Hippa training for healthcare employees
 
Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)
 
2017 HIPAA Clinical Research Training
2017 HIPAA Clinical Research Training2017 HIPAA Clinical Research Training
2017 HIPAA Clinical Research Training
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
Sylvia hipaa powerpoint presentation 2010(1)
Sylvia hipaa powerpoint presentation 2010(1)Sylvia hipaa powerpoint presentation 2010(1)
Sylvia hipaa powerpoint presentation 2010(1)
 
Mha690 wk 1 fletcher
Mha690 wk 1   fletcherMha690 wk 1   fletcher
Mha690 wk 1 fletcher
 
Hipaa education
Hipaa educationHipaa education
Hipaa education
 
Marc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentationMarc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentation
 
Confidentiality 9.26.13
Confidentiality 9.26.13Confidentiality 9.26.13
Confidentiality 9.26.13
 
HIPAA Compliance For Small Practices
HIPAA Compliance For Small PracticesHIPAA Compliance For Small Practices
HIPAA Compliance For Small Practices
 
Tiffany hall mha 690 week 1 discussion 2
Tiffany hall mha 690 week 1   discussion 2Tiffany hall mha 690 week 1   discussion 2
Tiffany hall mha 690 week 1 discussion 2
 

Último

Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 

Último (20)

Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 

Upholding confidentiality

  • 1. Upholding Confidentiality It is your ethical responsibility Theresa Tapley MHA690: Health Care Capstone Ashford University Dr. David Cole April 23, 2013
  • 2. Objectives  Understanding of HIPAA  Ethical Responsibility to keep each and every patient’s PHI confidential  Patient Privacy Rule and Security Rules  Identification of what PHI is  Ways to protect PHI  Tips for electronic confidentiality protections  Consequences if confidentiality or PHI mishandlement
  • 3. What is Health Insurance Portability and Accountability Act (HIPAA)?  HIPPA is a federal law that gives an individual the right of protection of their personal health information (PHI).  PHI includes all medical and personal information and must be protected whether communication is verbal, written, or electronic. (U.S. Department HHS, 2012)
  • 4. Forms of Sensitive Information Sensitive Information exists in various forms Printed Spoken Electronic It is the responsibility of every employee to protect the privacy and security of sensitive information in ALL forms
  • 5. What Information is Considered Confidential and must be Protected?  Personal billing information  All medical records  Conversations between physician and other medical staff regarding a patient  Information about a patient within their Insurance carrier’s database
  • 6. Patient Privacy Rule Rights  The right to see and obtain a copy of their health record  The right to have corrections added to their personal health record  The right to receive notice about how their health information will be used or shared for certain purposes  The right to get a report of when and why their health information was shared  The right to file a complaint with the provider or health insurer  The right to file a complaint with the U. S. Government
  • 7. Personal Health Information How to keep it confidential  Never leave medical records where others can gain access to them  PHI should be guarded and kept confidential, shared only with healthcare providers involved in their healthcare  PHI is confidential and should not be viewed on paper or on computer by unauthorized staff
  • 8. Ways to Protect Confidentiality of PHI  PHI should only be shared with other healthcare professionals directly involved in an individual’s care  Records are kept locked and only people with a need to see information about patients have access to them  Employees who use computerized patient records to not leave their computers logged in to the patient information system while they are not at their workstations. Computer screens containing patient information are turned away from the view of the public or people passing by.
  • 9. More Ways to Protect Confidentiality of PHI  Posted or written patient information maintained in work areas such as nurses’ stations or front desk is kept covered from the public.  Discussions about patient care are kept private to reduce the likelihood that those who do not need to know will overhear.  Electronic records are kept secure, and the facility monitors who gains access to records to ensure that they are being used appropriately.  Paper records are always shredded or placed in closed receptacles for delivery to a company that destroys records for the facility. They must never be left in the garbage.
  • 10. Understanding the Security Rule  Specifies a series of administrative, physical, and technical safeguards for covered entities to use to assure the confidentiality, integrity, and availability of electronic protected health information  The Security Rule defines “confidentiality” to mean that e-PHI is not available or disclosed to unauthorized persons. The Security Rule's confidentiality requirements support the Privacy Rule's prohibitions against improper uses and disclosures of PHI  The Security rule also promotes the two additional goals of maintaining the integrity and availability of e-PHI  Designation of a security official who is responsible for developing and implement its security policies and procedures
  • 11. Electronic confidentiality protections  Keep passwords and other security features that restrict access to your computer private  Never share password access or log in to the health information system using a borrowed credential
  • 12. More steps for protecting electronic information  Point computer screen away from the public  Never walk away from your computer with PHI up and in view of a passerby  Never remove computer equipment, disks, or software unless instructed to do so by your supervisor  Never send confidential patient information in an e-mail unless it is encrypted  Always double-check the address line of an email before you send it.
  • 13. Penalties for Breaches Breaches of the HIPAA Privacy and Security Rules have serious ramifications for all involved. In addition to sanctions imposed by this organization, such breaches may result in civil and criminal penalties. Statutory and regulatory penalties for breaches may include: Civil: $50,000 per incident, up to $1.5 million per calendar year for violations that are not corrected Criminal: $50,000 to $250,000 in fines and up to 10 years in prison In addition, institutions that fail to correct a HIPAA violation may be fined up to $50,000 per violation.
  • 14. Best Practice Reminders  DO keep computer sign-on codes and passwords secret, and DO NOT allow unauthorized  persons access to your computer. Also, use locked screensavers for added privacy.  DO keep notes, files, memory sticks, and computers in a secure place, and be careful to NOT  leave them in open areas outside your workplace, such as a library, cafeteria, or airport.  DO NOT place PHI or PII on a mobile device without required approval. DO encrypt mobile  devices that contain PHI or PII.  DO hold discussions of PHI in private areas and for job-related reasons only. Also, be aware of  places where others might overhear conversations, such as in reception areas.  DO make certain when mailing documents that no sensitive information is shown on postcards or  through envelope windows, and that envelopes are closed securely.  DO NOT use unsealed campus mail envelopes when sending sensitive information to another  employee.  DO follow procedures for the proper disposal of sensitive information, such as shredding  documents or using locked recycling drop boxes.  When sending an e-mail, DO NOT include PHI or other sensitive information such as Social  Security numbers, unless you have the proper written approval to store the information and  encrypted your computer or e-mail. (UNC, 2013)
  • 15. References HIPAA (n.d.) HIPAA training handbook for the healthcare staff: An introduction to confidentiality and privacy under HIPAA. Retrieved from website: http://www.regalmed.com/pdfs/HIPAA_Handbook.pdf Kongstvedt, P.R. (2007). Essentials of managed health care (5th ed.). MA: Jones and Bartlett Publishers. U.S. Department of Health & Human Services (2012). Health Information Privacy. Retrieved form U.S. Department of Health and Human Services website: http://www.hhs.gov/ocr/privacy/hipaa/understanding/consumers/ind ex.html University of North Carolina (UNC) (2013). HIPAA, privacy, & security. Retrieved from website: http://www.unc.edu/hipaa/Annual%20HIPAA%20Training%20current.p df