SlideShare a Scribd company logo
1 of 8
By: Ashley Gavin
            MHA 690
Dr. David Shawn Cole
                4/5/12
   Workplace confidentiality can be defined as
    keeping the employee, customer and client
    information private

   Confidentiality is a fundamental part of
    professional practice that protects human
    rights
    The HIPAA Privacy Rule provides federal protections
    for personal health information held by covered entities
    and gives patients an array of rights with respect to that
    information

   The Privacy Rule is balanced so that it permits the
    disclosure of personal health information needed for
    patient care and other important purposes

   The Security Rule specifies a series of
    administrative, physical, and technical safeguards for
    covered entities to use to assure the
    confidentiality, integrity, and availability of electronic
    protected health information
   More than 120 workers at a UCLA hospital
    viewed celebrities medical records and other
    personal information without permission

   Supervisors’ passwords were compromised by
    employees in order to obtain the information

   This was a breach of confidentiality between
    patient-employee privileges and rights
   Patient information should not be discussed among
    employees on the clock nor off of the clock

   Staff should always log off, turn off, or lock their
    computers

   Sensitive information should have security controls
    that are only accessible to management

   Passwords should regularly be changed to ensure
    security
   The human resource professionals should take
    necessary steps to prevent the misuse of
    information that is personal

   Once the policies are devised, the next thing to
    do is to communicate the same to all the
    employees, supervisors and managers
   Training them about the confidentiality issues by
    giving them printouts of the policy or holding
    meetings and seminars in the office which teach
    the importance of confidentiality to the
    employees, should be done on a regular basis

   Employees are informed of what is considered as
    a breach of confidentiality and what the
    consequences of their actions will lead to in forms
    of disciplinary measures
   What is HIPAA. Implementation of HIPAA and the
    privacy rule of the IRB. Retrieved April 5, 2012, from
    http://www.research.uci.edu

   120 UCLA Hospital Staff Saw Celebrity Health
    Records. Retrieved April 5, 2012, from
    http://www.foxnews.com

More Related Content

What's hot

susanfullerMha690 week1discussion2pp
susanfullerMha690 week1discussion2ppsusanfullerMha690 week1discussion2pp
susanfullerMha690 week1discussion2ppPrayerful
 
Week 1 dq 2 - confidentiality1
Week 1   dq 2 - confidentiality1Week 1   dq 2 - confidentiality1
Week 1 dq 2 - confidentiality1mesaunders
 
Hippa compliance training
Hippa compliance trainingHippa compliance training
Hippa compliance trainingscapoccia
 
Confidentiality mha 690
Confidentiality mha 690Confidentiality mha 690
Confidentiality mha 690tohoty6719
 
Week 1 dq 2 - confidentiality1
Week 1   dq 2 - confidentiality1Week 1   dq 2 - confidentiality1
Week 1 dq 2 - confidentiality1mesaunders
 
Patient Privacy Training
Patient Privacy TrainingPatient Privacy Training
Patient Privacy Trainingcarenanichole
 
Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentialityToni Meeks
 
Introduction hippaa
Introduction hippaaIntroduction hippaa
Introduction hippaaTina Peña
 
MHA690 Week 1 Patient Privacy and Confidentiality
MHA690 Week 1 Patient Privacy and ConfidentialityMHA690 Week 1 Patient Privacy and Confidentiality
MHA690 Week 1 Patient Privacy and ConfidentialityRitaJackson81
 
Patient confidentiality training
Patient confidentiality trainingPatient confidentiality training
Patient confidentiality trainingSheena705
 
Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentialityptamayo1958
 
Hipaa and patient medical record confidentiality
Hipaa and patient medical record confidentialityHipaa and patient medical record confidentiality
Hipaa and patient medical record confidentialityvflores007
 
Healthcare Confidentiality
Healthcare ConfidentialityHealthcare Confidentiality
Healthcare Confidentialityljbroshious
 

What's hot (14)

susanfullerMha690 week1discussion2pp
susanfullerMha690 week1discussion2ppsusanfullerMha690 week1discussion2pp
susanfullerMha690 week1discussion2pp
 
Week 1 dq 2 - confidentiality1
Week 1   dq 2 - confidentiality1Week 1   dq 2 - confidentiality1
Week 1 dq 2 - confidentiality1
 
Hippa compliance training
Hippa compliance trainingHippa compliance training
Hippa compliance training
 
Confidentiality mha 690
Confidentiality mha 690Confidentiality mha 690
Confidentiality mha 690
 
Week 1 dq 2 - confidentiality1
Week 1   dq 2 - confidentiality1Week 1   dq 2 - confidentiality1
Week 1 dq 2 - confidentiality1
 
Patient Privacy Training
Patient Privacy TrainingPatient Privacy Training
Patient Privacy Training
 
Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentiality
 
Introduction hippaa
Introduction hippaaIntroduction hippaa
Introduction hippaa
 
MHA690 Week 1 Patient Privacy and Confidentiality
MHA690 Week 1 Patient Privacy and ConfidentialityMHA690 Week 1 Patient Privacy and Confidentiality
MHA690 Week 1 Patient Privacy and Confidentiality
 
Patient confidentiality training
Patient confidentiality trainingPatient confidentiality training
Patient confidentiality training
 
Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentiality
 
Tasia Confidentiality PPT
Tasia Confidentiality PPTTasia Confidentiality PPT
Tasia Confidentiality PPT
 
Hipaa and patient medical record confidentiality
Hipaa and patient medical record confidentialityHipaa and patient medical record confidentiality
Hipaa and patient medical record confidentiality
 
Healthcare Confidentiality
Healthcare ConfidentialityHealthcare Confidentiality
Healthcare Confidentiality
 

Viewers also liked

Viewers also liked (11)

Global warming
Global warmingGlobal warming
Global warming
 
Digitális lábnyom i.
Digitális lábnyom i.Digitális lábnyom i.
Digitális lábnyom i.
 
Accelerated tissue repair
Accelerated tissue repairAccelerated tissue repair
Accelerated tissue repair
 
Portfolio Buro Gom
Portfolio Buro GomPortfolio Buro Gom
Portfolio Buro Gom
 
What is confidentiality
What is confidentialityWhat is confidentiality
What is confidentiality
 
Msproject
MsprojectMsproject
Msproject
 
W.E.B. Dubois
W.E.B. DuboisW.E.B. Dubois
W.E.B. Dubois
 
Your Life, Your Legacy
Your Life, Your LegacyYour Life, Your Legacy
Your Life, Your Legacy
 
Diagramming.
Diagramming.Diagramming.
Diagramming.
 
Google in china
Google in chinaGoogle in china
Google in china
 
Okislitelno vosstanovitelnye reakcii_720[3]
Okislitelno vosstanovitelnye reakcii_720[3]Okislitelno vosstanovitelnye reakcii_720[3]
Okislitelno vosstanovitelnye reakcii_720[3]
 

Similar to What is confidentiality

Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentialityToni Meeks
 
Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentialityToni Meeks
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013LeRoy Ulibarri
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013LeRoy Ulibarri
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013LeRoy Ulibarri
 
Week 1 dq 2 - confidentiality1
Week 1   dq 2 - confidentiality1Week 1   dq 2 - confidentiality1
Week 1 dq 2 - confidentiality1mesaunders
 
Week 1 dq 2 - confidentiality1
Week 1   dq 2 - confidentiality1Week 1   dq 2 - confidentiality1
Week 1 dq 2 - confidentiality1mesaunders
 
Week 1 dq 2 - confidentiality1
Week 1   dq 2 - confidentiality1Week 1   dq 2 - confidentiality1
Week 1 dq 2 - confidentiality1mesaunders
 
Week 1 dq 2 - confidentiality1
Week 1   dq 2 - confidentiality1Week 1   dq 2 - confidentiality1
Week 1 dq 2 - confidentiality1mesaunders
 
Week 1 discussion 2
Week 1 discussion 2Week 1 discussion 2
Week 1 discussion 2girly12
 
Confidentiality training mha 690
Confidentiality training mha 690Confidentiality training mha 690
Confidentiality training mha 690KenyaPoole
 
Discussion2
Discussion2 Discussion2
Discussion2 amberlinn
 
Upholding confidentiality
Upholding confidentialityUpholding confidentiality
Upholding confidentialityTheresa Tapley
 
Patient confedentiality ppt
Patient confedentiality pptPatient confedentiality ppt
Patient confedentiality pptYuli Vargas
 
Patient confidentiality 9.26.13
Patient confidentiality 9.26.13Patient confidentiality 9.26.13
Patient confidentiality 9.26.13pneville0629
 
Confidentiality
ConfidentialityConfidentiality
Confidentialitylucia2764
 
How can the info listed here be written into 2�3-page paper with APA.pdf
How can the info listed here be written into 2�3-page paper with APA.pdfHow can the info listed here be written into 2�3-page paper with APA.pdf
How can the info listed here be written into 2�3-page paper with APA.pdffmac5
 
Confidentiality of Health Care
Confidentiality of Health CareConfidentiality of Health Care
Confidentiality of Health Carekmcgrew1219
 

Similar to What is confidentiality (20)

Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentiality
 
Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentiality
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
Week 1 dq 2 - confidentiality1
Week 1   dq 2 - confidentiality1Week 1   dq 2 - confidentiality1
Week 1 dq 2 - confidentiality1
 
Week 1 dq 2 - confidentiality1
Week 1   dq 2 - confidentiality1Week 1   dq 2 - confidentiality1
Week 1 dq 2 - confidentiality1
 
Week 1 dq 2 - confidentiality1
Week 1   dq 2 - confidentiality1Week 1   dq 2 - confidentiality1
Week 1 dq 2 - confidentiality1
 
Week 1 dq 2 - confidentiality1
Week 1   dq 2 - confidentiality1Week 1   dq 2 - confidentiality1
Week 1 dq 2 - confidentiality1
 
Week 1 discussion 2
Week 1 discussion 2Week 1 discussion 2
Week 1 discussion 2
 
Confidentiality training mha 690
Confidentiality training mha 690Confidentiality training mha 690
Confidentiality training mha 690
 
Discussion2
Discussion2 Discussion2
Discussion2
 
Upholding confidentiality
Upholding confidentialityUpholding confidentiality
Upholding confidentiality
 
Patient confedentiality ppt
Patient confedentiality pptPatient confedentiality ppt
Patient confedentiality ppt
 
Patient confidentiality 9.26.13
Patient confidentiality 9.26.13Patient confidentiality 9.26.13
Patient confidentiality 9.26.13
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
How can the info listed here be written into 2�3-page paper with APA.pdf
How can the info listed here be written into 2�3-page paper with APA.pdfHow can the info listed here be written into 2�3-page paper with APA.pdf
How can the info listed here be written into 2�3-page paper with APA.pdf
 
Confidentiality of Health Care
Confidentiality of Health CareConfidentiality of Health Care
Confidentiality of Health Care
 
Mha.690
Mha.690Mha.690
Mha.690
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 

Recently uploaded

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

What is confidentiality

  • 1. By: Ashley Gavin MHA 690 Dr. David Shawn Cole 4/5/12
  • 2. Workplace confidentiality can be defined as keeping the employee, customer and client information private  Confidentiality is a fundamental part of professional practice that protects human rights
  • 3. The HIPAA Privacy Rule provides federal protections for personal health information held by covered entities and gives patients an array of rights with respect to that information  The Privacy Rule is balanced so that it permits the disclosure of personal health information needed for patient care and other important purposes  The Security Rule specifies a series of administrative, physical, and technical safeguards for covered entities to use to assure the confidentiality, integrity, and availability of electronic protected health information
  • 4. More than 120 workers at a UCLA hospital viewed celebrities medical records and other personal information without permission  Supervisors’ passwords were compromised by employees in order to obtain the information  This was a breach of confidentiality between patient-employee privileges and rights
  • 5. Patient information should not be discussed among employees on the clock nor off of the clock  Staff should always log off, turn off, or lock their computers  Sensitive information should have security controls that are only accessible to management  Passwords should regularly be changed to ensure security
  • 6. The human resource professionals should take necessary steps to prevent the misuse of information that is personal  Once the policies are devised, the next thing to do is to communicate the same to all the employees, supervisors and managers
  • 7. Training them about the confidentiality issues by giving them printouts of the policy or holding meetings and seminars in the office which teach the importance of confidentiality to the employees, should be done on a regular basis  Employees are informed of what is considered as a breach of confidentiality and what the consequences of their actions will lead to in forms of disciplinary measures
  • 8. What is HIPAA. Implementation of HIPAA and the privacy rule of the IRB. Retrieved April 5, 2012, from http://www.research.uci.edu  120 UCLA Hospital Staff Saw Celebrity Health Records. Retrieved April 5, 2012, from http://www.foxnews.com