SlideShare uma empresa Scribd logo
1 de 10
Patient Health
Information
(PHI) must not
be improperly
disclosed.
Say no to
unauthorized
requests for
PHI.
Make sure
those passing
by don't see
PHI.
Patient Confidentiality 101
Health Insurance Portability and Accountability
Act (HIPAA) Basics
Why is Confidentiality Important?
Hospital’s Confidentiality Policy
What is a Breach of Confidentiality?
Audits and Monitoring Process
Reporting Violations
Disciplinary Actions
HIPAA Basics
 The Health Insurance Portability and Accountability Act (HIPAA) of
1996 (Public Law 104-191) was designed to protect the
privacy, confidentiality, and security of patient information.
 HIPAA standards are applicable to all health information in all of its
formats (e.g., electronic, paper, verbal). It applies to both electronically
maintained and transmitted information.
 HIPAA privacy standards include restrictions on access to individually
identifiable health information and the use and disclosure of that
information, as well as requirements for administrative activities such
as training, compliance, and enforcement of HIPAA mandates.
(Pozgar, 2012).
Why is confidentiality
important
 Confidentiality safeguards information that is gathered in the context of
an intimate relationship.
 It addresses the issue of how to keep information exchanged from being
disclosed to third parties.
 For example, confidentiality prevents physicians from disclosing
information shared with them by a patient in the course of a physician–
patient relationship.
 Any unauthorized or inadvertent disclosures of data gained as part of an
intimate relationship are breaches of confidentiality.
(Nass, Levit & Gostin, 2009).
 Adhere to hospital’s policies on confidentiality privacy, at all times.
 Access patient information only when information is required to
perform your work.
 Do not share or discuss patient information, unless it is necessary to
perform your work.
 Don’t ever share your identification number or password with anyone.
 Log off your computer session when you are not by your workstation.
 Ensure confidentiality when handling protected healthcare
information.
 All hospital employees will review the Privacy of Health Information
(PDF) Booklet located in the hospital’s portal; complete the quiz at
the end of booklet, and print certificate for inclusion in employee’s
personal record.
 All hospital employees will review, sign and return the Confidentiality
Form (PDF), located in the hospital portal.
Hospital’s Confidentiality poliCy
(Confidentiality and Privacy of Patient Information, n.d.).
 A breach of confidentiality occurs when a disclosure is
made to third party, without patient consent or court
order, of private patient information that the physician has
learned within the patient-physician relationship.
 Disclosures can be oral or written, by telephone or fax, or
electronically.
 For example, via e-mail or health information networks.
The medium is irrelevant, although special security
requirements may apply to the electronic transfer of
information.
What is a breach of
confidentiality?
Patient Confidentiality, (n.d.).
AUDITS & MONITORING process
 The hospital’s computer systems records all of your
system activities.
 The information you view and access using your account
leaves a digital trail of information, which includes where
you go and what you do.
 The system audits and monitors access to confidential
patient information on a regular basis; only access
information required to perform your job.
 All employees will be held accountable for unauthorized
access to confidential information.
(Protecting Patient Confidentiality and Security, 2011).
Reporting violations
 If you witness or suspect a confidentiality violation of a patient’s health
information, you must report it immediately to your supervisor.
 Other reporting means include:
 Hospital’s privacy office (email: vcsvs@hospital.edu or call 667-6726).
 Hospital’s Security office (email: lalks@hospital.edu or call 667-7363).
 Hospital’s Quality Assurance( email: qual@hospital.edu or call 667-
8272.
 You may also report violations anonymously, via the hospital’s Hotline,
 at 677-4444).
 REMEMBER: Reporting is everyone’s responsibility!
(Protecting Patient Confidentiality and Security, 2011).
Disciplinary actions
Unauthorized Access
equals
Termination of employment
References
Confidentiality and Privacy of Patient Information. (n.d.). Medical College of Wisconsin. Retrieved 2013, from
http://www.mcw.edu/GME/AR/ConfidentialityandPrivacyofPatientInformation.htm.
Patient Confidentiality. (n.d.). American Medical Association. Retrieved 2013, from http://www.ama-
assn.org//ama/pub/physician-resources/legal-topics/patient-physician-relationship-topics/patient-
confidentiality.page.
Pozgar, G. D. (2012). Legal aspects of health care administration (11th ed.). Sudbury, MA: Jones & Bartlett Learning.
Protecting Patient Confidentiality and Security. (2011). Upstate Medical University. Retrieved 2013, from
http://www.upstate.edu/forms/documents/F84037.pdf
Nass, S. J., Levit, L. A., & Gostin, L. O. (2009). Beyond the HIPAA Privacy Rule: Enhancing Privacy, Improving Health
Through Research. National Center for Biotechnology Information. Retrieved 2013, from
http://www.ncbi.nlm.nih.gov/books/NBK9579/.

Mais conteúdo relacionado

Mais procurados

Confidentiality
Confidentiality Confidentiality
Confidentiality pcsamuels10
 
The importance of confidentiality
The importance of confidentialityThe importance of confidentiality
The importance of confidentialityMOTHOM0556
 
Lecture 13 privacy, confidentiality and medical records
Lecture 13 privacy, confidentiality and medical recordsLecture 13 privacy, confidentiality and medical records
Lecture 13 privacy, confidentiality and medical recordsDr Ghaiath Hussein
 
Upholding confidentiality
Upholding confidentialityUpholding confidentiality
Upholding confidentialityTheresa Tapley
 
Confidentiality
ConfidentialityConfidentiality
Confidentialityblutoothe
 
SCHS Topic 5: Privacy, Confidentiality and Medical Records
SCHS Topic 5: Privacy, Confidentiality and Medical RecordsSCHS Topic 5: Privacy, Confidentiality and Medical Records
SCHS Topic 5: Privacy, Confidentiality and Medical RecordsDr Ghaiath Hussein
 
Confidentiality in the Workplace
Confidentiality in the WorkplaceConfidentiality in the Workplace
Confidentiality in the Workplacesalvarez63
 
Privacy & confedentiality
Privacy & confedentialityPrivacy & confedentiality
Privacy & confedentialityHemang Patel
 
Health care confidentiality and privacy
Health care confidentiality and privacyHealth care confidentiality and privacy
Health care confidentiality and privacysawanda
 
Confidentiality in Healthcare
Confidentiality in HealthcareConfidentiality in Healthcare
Confidentiality in Healthcarekmasterson
 
The importance of confidentiality
The importance of confidentialityThe importance of confidentiality
The importance of confidentialityswilson0050
 
Healthcare Information Privacy & Confidentiality: How To Work Very Well With ...
Healthcare Information Privacy & Confidentiality: How To Work Very Well With ...Healthcare Information Privacy & Confidentiality: How To Work Very Well With ...
Healthcare Information Privacy & Confidentiality: How To Work Very Well With ...Nawanan Theera-Ampornpunt
 
MODULE 8 - PRIVACY AND CONFIDENTIALITY
MODULE 8 - PRIVACY AND CONFIDENTIALITYMODULE 8 - PRIVACY AND CONFIDENTIALITY
MODULE 8 - PRIVACY AND CONFIDENTIALITYDr Ghaiath Hussein
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA BasicsKarna *
 
Confidentiality New Employee Training (First-Week)
Confidentiality New Employee Training (First-Week)Confidentiality New Employee Training (First-Week)
Confidentiality New Employee Training (First-Week)ChildrensHomeIllinois
 
Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)bholmes
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippamaggie_Platt
 

Mais procurados (20)

Confidentiality
Confidentiality Confidentiality
Confidentiality
 
The importance of confidentiality
The importance of confidentialityThe importance of confidentiality
The importance of confidentiality
 
Lecture 13 privacy, confidentiality and medical records
Lecture 13 privacy, confidentiality and medical recordsLecture 13 privacy, confidentiality and medical records
Lecture 13 privacy, confidentiality and medical records
 
Upholding confidentiality
Upholding confidentialityUpholding confidentiality
Upholding confidentiality
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
SCHS Topic 5: Privacy, Confidentiality and Medical Records
SCHS Topic 5: Privacy, Confidentiality and Medical RecordsSCHS Topic 5: Privacy, Confidentiality and Medical Records
SCHS Topic 5: Privacy, Confidentiality and Medical Records
 
Confidentiality in the Workplace
Confidentiality in the WorkplaceConfidentiality in the Workplace
Confidentiality in the Workplace
 
Privacy & confedentiality
Privacy & confedentialityPrivacy & confedentiality
Privacy & confedentiality
 
Health care confidentiality and privacy
Health care confidentiality and privacyHealth care confidentiality and privacy
Health care confidentiality and privacy
 
Confidentiality in Healthcare
Confidentiality in HealthcareConfidentiality in Healthcare
Confidentiality in Healthcare
 
The importance of confidentiality
The importance of confidentialityThe importance of confidentiality
The importance of confidentiality
 
Healthcare Information Privacy & Confidentiality: How To Work Very Well With ...
Healthcare Information Privacy & Confidentiality: How To Work Very Well With ...Healthcare Information Privacy & Confidentiality: How To Work Very Well With ...
Healthcare Information Privacy & Confidentiality: How To Work Very Well With ...
 
MODULE 8 - PRIVACY AND CONFIDENTIALITY
MODULE 8 - PRIVACY AND CONFIDENTIALITYMODULE 8 - PRIVACY AND CONFIDENTIALITY
MODULE 8 - PRIVACY AND CONFIDENTIALITY
 
Confidentiality
Confidentiality Confidentiality
Confidentiality
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA Basics
 
Confidentiality New Employee Training (First-Week)
Confidentiality New Employee Training (First-Week)Confidentiality New Employee Training (First-Week)
Confidentiality New Employee Training (First-Week)
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippa
 

Destaque

Confidentially in the workplace
Confidentially in the workplaceConfidentially in the workplace
Confidentially in the workplaceKnighten
 
Employee confidentiality training
Employee confidentiality trainingEmployee confidentiality training
Employee confidentiality trainingJessi Morris
 
Workplace strategies for protecting confidential and proprietary property
Workplace strategies for protecting confidential and proprietary propertyWorkplace strategies for protecting confidential and proprietary property
Workplace strategies for protecting confidential and proprietary propertyNow Dentons
 
Emp Rights & Responsibility
Emp Rights & ResponsibilityEmp Rights & Responsibility
Emp Rights & Responsibilityeshontee09
 
susanfullerMha690 week1discussion2pp
susanfullerMha690 week1discussion2ppsusanfullerMha690 week1discussion2pp
susanfullerMha690 week1discussion2ppPrayerful
 
Safety Rules in the Workplace & Office
Safety Rules in the Workplace & OfficeSafety Rules in the Workplace & Office
Safety Rules in the Workplace & OfficeOxbridge Academy
 
Conflict Management Among Staff
Conflict Management Among StaffConflict Management Among Staff
Conflict Management Among StaffDarci Stanford
 

Destaque (12)

Mha wk 1 dis 2
Mha wk 1 dis 2Mha wk 1 dis 2
Mha wk 1 dis 2
 
Hippa
HippaHippa
Hippa
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Confidentially in the workplace
Confidentially in the workplaceConfidentially in the workplace
Confidentially in the workplace
 
Employee confidentiality training
Employee confidentiality trainingEmployee confidentiality training
Employee confidentiality training
 
Workplace strategies for protecting confidential and proprietary property
Workplace strategies for protecting confidential and proprietary propertyWorkplace strategies for protecting confidential and proprietary property
Workplace strategies for protecting confidential and proprietary property
 
Emp Rights & Responsibility
Emp Rights & ResponsibilityEmp Rights & Responsibility
Emp Rights & Responsibility
 
susanfullerMha690 week1discussion2pp
susanfullerMha690 week1discussion2ppsusanfullerMha690 week1discussion2pp
susanfullerMha690 week1discussion2pp
 
Conflic resolution
Conflic resolution Conflic resolution
Conflic resolution
 
Safety Rules in the Workplace & Office
Safety Rules in the Workplace & OfficeSafety Rules in the Workplace & Office
Safety Rules in the Workplace & Office
 
Conflict Management Among Staff
Conflict Management Among StaffConflict Management Among Staff
Conflict Management Among Staff
 
Sexual Harassment in the Philippine Workplace
Sexual Harassment in the Philippine WorkplaceSexual Harassment in the Philippine Workplace
Sexual Harassment in the Philippine Workplace
 

Semelhante a Confidentiality

Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013LeRoy Ulibarri
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013LeRoy Ulibarri
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013LeRoy Ulibarri
 
MHA 690 week 2 discussin
MHA 690 week 2 discussinMHA 690 week 2 discussin
MHA 690 week 2 discussinBrooke A Thomas
 
Patient confidentiality 2
Patient confidentiality 2Patient confidentiality 2
Patient confidentiality 2Alice Felton
 
Confidentiality 9.26.13
Confidentiality 9.26.13Confidentiality 9.26.13
Confidentiality 9.26.13pneville0629
 
Hippa final JU nursing informatics
Hippa final JU nursing informaticsHippa final JU nursing informatics
Hippa final JU nursing informaticskmcanty
 
Discussion2
Discussion2 Discussion2
Discussion2 amberlinn
 
Week 1 dq1
Week 1 dq1Week 1 dq1
Week 1 dq1SNikki
 
Training manual point
Training manual pointTraining manual point
Training manual pointchdafe1253
 
Week 1 discussion 2
Week 1 discussion 2Week 1 discussion 2
Week 1 discussion 2girly12
 
Patient confidentiality MHA 690
Patient confidentiality MHA 690Patient confidentiality MHA 690
Patient confidentiality MHA 690AMSIMM9932
 
HIPAA INSERVICE 2017
HIPAA INSERVICE 2017 HIPAA INSERVICE 2017
HIPAA INSERVICE 2017 Meg Oser
 
Sylvia hipaa powerpoint presentation 2010(1)
Sylvia hipaa powerpoint presentation 2010(1)Sylvia hipaa powerpoint presentation 2010(1)
Sylvia hipaa powerpoint presentation 2010(1)bholmes
 
Training on confidentiality MHA690 Hayden
Training on confidentiality MHA690 HaydenTraining on confidentiality MHA690 Hayden
Training on confidentiality MHA690 Haydenhaydens
 
MHA 690: Confidentiality
MHA 690: ConfidentialityMHA 690: Confidentiality
MHA 690: Confidentialityvpharoah
 
Ethical And Legal Aspects Of Health Care
Ethical And Legal Aspects Of Health CareEthical And Legal Aspects Of Health Care
Ethical And Legal Aspects Of Health CareLajpat Rai
 
Patient Confidentiality Training Presentation (1)
Patient Confidentiality Training Presentation (1)Patient Confidentiality Training Presentation (1)
Patient Confidentiality Training Presentation (1)DonnaShockley
 
Marc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentationMarc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentationMarcEtienne6
 

Semelhante a Confidentiality (20)

Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
MHA 690 week 2 discussin
MHA 690 week 2 discussinMHA 690 week 2 discussin
MHA 690 week 2 discussin
 
Patient confidentiality 2
Patient confidentiality 2Patient confidentiality 2
Patient confidentiality 2
 
Confidentiality 9.26.13
Confidentiality 9.26.13Confidentiality 9.26.13
Confidentiality 9.26.13
 
Hippa final JU nursing informatics
Hippa final JU nursing informaticsHippa final JU nursing informatics
Hippa final JU nursing informatics
 
Discussion2
Discussion2 Discussion2
Discussion2
 
Week 1 dq1
Week 1 dq1Week 1 dq1
Week 1 dq1
 
Training manual point
Training manual pointTraining manual point
Training manual point
 
Week 1 discussion 2
Week 1 discussion 2Week 1 discussion 2
Week 1 discussion 2
 
Patient confidentiality MHA 690
Patient confidentiality MHA 690Patient confidentiality MHA 690
Patient confidentiality MHA 690
 
HIPAA INSERVICE 2017
HIPAA INSERVICE 2017 HIPAA INSERVICE 2017
HIPAA INSERVICE 2017
 
Sylvia hipaa powerpoint presentation 2010(1)
Sylvia hipaa powerpoint presentation 2010(1)Sylvia hipaa powerpoint presentation 2010(1)
Sylvia hipaa powerpoint presentation 2010(1)
 
Training on confidentiality MHA690 Hayden
Training on confidentiality MHA690 HaydenTraining on confidentiality MHA690 Hayden
Training on confidentiality MHA690 Hayden
 
MHA 690: Confidentiality
MHA 690: ConfidentialityMHA 690: Confidentiality
MHA 690: Confidentiality
 
Confidentiality Training
Confidentiality Training Confidentiality Training
Confidentiality Training
 
Ethical And Legal Aspects Of Health Care
Ethical And Legal Aspects Of Health CareEthical And Legal Aspects Of Health Care
Ethical And Legal Aspects Of Health Care
 
Patient Confidentiality Training Presentation (1)
Patient Confidentiality Training Presentation (1)Patient Confidentiality Training Presentation (1)
Patient Confidentiality Training Presentation (1)
 
Marc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentationMarc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentation
 

Último

Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxPoojaSen20
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 

Último (20)

Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 

Confidentiality

  • 1. Patient Health Information (PHI) must not be improperly disclosed. Say no to unauthorized requests for PHI. Make sure those passing by don't see PHI.
  • 2. Patient Confidentiality 101 Health Insurance Portability and Accountability Act (HIPAA) Basics Why is Confidentiality Important? Hospital’s Confidentiality Policy What is a Breach of Confidentiality? Audits and Monitoring Process Reporting Violations Disciplinary Actions
  • 3. HIPAA Basics  The Health Insurance Portability and Accountability Act (HIPAA) of 1996 (Public Law 104-191) was designed to protect the privacy, confidentiality, and security of patient information.  HIPAA standards are applicable to all health information in all of its formats (e.g., electronic, paper, verbal). It applies to both electronically maintained and transmitted information.  HIPAA privacy standards include restrictions on access to individually identifiable health information and the use and disclosure of that information, as well as requirements for administrative activities such as training, compliance, and enforcement of HIPAA mandates. (Pozgar, 2012).
  • 4. Why is confidentiality important  Confidentiality safeguards information that is gathered in the context of an intimate relationship.  It addresses the issue of how to keep information exchanged from being disclosed to third parties.  For example, confidentiality prevents physicians from disclosing information shared with them by a patient in the course of a physician– patient relationship.  Any unauthorized or inadvertent disclosures of data gained as part of an intimate relationship are breaches of confidentiality. (Nass, Levit & Gostin, 2009).
  • 5.  Adhere to hospital’s policies on confidentiality privacy, at all times.  Access patient information only when information is required to perform your work.  Do not share or discuss patient information, unless it is necessary to perform your work.  Don’t ever share your identification number or password with anyone.  Log off your computer session when you are not by your workstation.  Ensure confidentiality when handling protected healthcare information.  All hospital employees will review the Privacy of Health Information (PDF) Booklet located in the hospital’s portal; complete the quiz at the end of booklet, and print certificate for inclusion in employee’s personal record.  All hospital employees will review, sign and return the Confidentiality Form (PDF), located in the hospital portal. Hospital’s Confidentiality poliCy (Confidentiality and Privacy of Patient Information, n.d.).
  • 6.  A breach of confidentiality occurs when a disclosure is made to third party, without patient consent or court order, of private patient information that the physician has learned within the patient-physician relationship.  Disclosures can be oral or written, by telephone or fax, or electronically.  For example, via e-mail or health information networks. The medium is irrelevant, although special security requirements may apply to the electronic transfer of information. What is a breach of confidentiality? Patient Confidentiality, (n.d.).
  • 7. AUDITS & MONITORING process  The hospital’s computer systems records all of your system activities.  The information you view and access using your account leaves a digital trail of information, which includes where you go and what you do.  The system audits and monitors access to confidential patient information on a regular basis; only access information required to perform your job.  All employees will be held accountable for unauthorized access to confidential information. (Protecting Patient Confidentiality and Security, 2011).
  • 8. Reporting violations  If you witness or suspect a confidentiality violation of a patient’s health information, you must report it immediately to your supervisor.  Other reporting means include:  Hospital’s privacy office (email: vcsvs@hospital.edu or call 667-6726).  Hospital’s Security office (email: lalks@hospital.edu or call 667-7363).  Hospital’s Quality Assurance( email: qual@hospital.edu or call 667- 8272.  You may also report violations anonymously, via the hospital’s Hotline,  at 677-4444).  REMEMBER: Reporting is everyone’s responsibility! (Protecting Patient Confidentiality and Security, 2011).
  • 10. References Confidentiality and Privacy of Patient Information. (n.d.). Medical College of Wisconsin. Retrieved 2013, from http://www.mcw.edu/GME/AR/ConfidentialityandPrivacyofPatientInformation.htm. Patient Confidentiality. (n.d.). American Medical Association. Retrieved 2013, from http://www.ama- assn.org//ama/pub/physician-resources/legal-topics/patient-physician-relationship-topics/patient- confidentiality.page. Pozgar, G. D. (2012). Legal aspects of health care administration (11th ed.). Sudbury, MA: Jones & Bartlett Learning. Protecting Patient Confidentiality and Security. (2011). Upstate Medical University. Retrieved 2013, from http://www.upstate.edu/forms/documents/F84037.pdf Nass, S. J., Levit, L. A., & Gostin, L. O. (2009). Beyond the HIPAA Privacy Rule: Enhancing Privacy, Improving Health Through Research. National Center for Biotechnology Information. Retrieved 2013, from http://www.ncbi.nlm.nih.gov/books/NBK9579/.