2. Introduction
HIPPA is the federal Health Insurance Portability
and Accountability Act of 1996. The main goal of
this law is to make it easier for people keep
health insurance, protect confidentiality and
security of healthcare information and help the
healthcare industry control administrative costs.
3. HIPAA regulates the use, transfer, and
disclosure of identifiable health
information. With these examples of
common HIPAA violations, you can
probably better understand HIPAA and the
types of behaviors it prohibits.
4. TYPES of HIPPA VIOLATIONS
There are many types of HIPPA violations.
• Violations of security
• Data breaches
• Employee Error
• Unauthorized release of patient’s Info
• Unauthorized access to patient Info
5. The need for HIPPA Training
There is many reasons to ensure that your
staff understands the need to keep the
private health information of there
patients private. In order for people to feel
comfortable to open up to their health care
provider they must believe that the
information they share with their
physicians will remain confidential.
6. Training Methods
Using educational material supplied by the
government.
Holding several trainings and in-services to train
and re-train staff.
Having information posted in areas that patients
and workers have access to.
Making sure employees understand material
provided to them.
7. • Checking programs for defects and potential
ways others could access private information.
• Having more than one program to back up the
security of private information.
• Only allow staff that needs to be in the file
access, and keeping private info hidden from
people who need to access file but do not
need private information.
8. Using methods to ensure HIPPA
• Having a program to monitor who is in a chart
and for how long.
• Using techniques such as punishments when
employees break HIPPA rules.
• Having extreme consequence for people who
actively break the rules, such as fines and
even jail time.
9. CONCLUSION
The Privacy Law requires that patient
information only be shared for treatment,
payment, and healthcare operations, or as
permitted by law, or as authorized by the
patient. Patient information that does not fall
into certain HIPAA defined categories must be
identified prior to sharing the data. Every
healthcare facility and organization must ensure
that patients rights are protected with training
staff properly and having severe consequences
when a breach has been attempted.
10. References:
HIPPA. (2015). TN Department of Health. Retrieved on July 23, 2015 from
http://tn.gov/health/
Examples of HIPPA Violations.(2015). Retrieved on July 23, 2015 from
http://examples.yourdictionary.com/examples-of-hipaa-violations.html
HIPPA Privacy & Security Laws. Retrieved on July 23, 2015 from
http://nursing.uncc.edu/sites/nursing.uncc.edu/files/media/HIPAAAceModul
e2010.pdf
11. Image References:
• Image 1
HIPPA REGULATIONS. Georgetown University. Retrieved on July
23, 2015 from https://ora.georgetown.edu/irb/HIPAA
• Image 2
Learning Can Support HIPPA Compliance Training. Retrieved
on July 23, 2015 from http://www.webanywhere.us/our-
blog/elearning-hipaa-compliance-training/