SlideShare uma empresa Scribd logo
1 de 13
Mandatory HIPPA Training
and its Importance
Falane J. St. Jean
MHA 690
Week 1:Dicussion 2
February 2, 2012
Keep under lock and key!!!
Confidentiality of Patients
PHI
HIPPA and Its Importance
• HIPAA stands for Health Insurance Portability
and Accountability Act of 1996 and is
composed of three components:
• Insurance Portability
• Fraud Enforcement
• Administrative Simplification
HIPPA and Its Importance Cont.
• The Health Insurance Portability and Accountability Act
(HIPAA) of 1996 established guidelines and regulations for the
use and disclosure of information about patients’ records
(www.hippa.gov).
• HIPAA also requires that electronic health transactions be
standardized to improve the efficiency and effectiveness in
the United State’s health care system via strengthening the
use of electronic data (Kongstvedt, P. R.,2007).
• Department of Health and Human Services (HHS) Office for
Civil Rights (OCR) is responsible for enforcing the Privacy and
Security Rules enforcement of HIPAA (www.hippa.gov).
HIPPA and Its Importance Continued
• This session will focus on the Security Rule
section of HIPAA and the responsibilities of
units or entities to protect and safeguard the
confidentiality of PHI that is either created,
maintained, and transmitted in electronic
form.
HIPPA Presentation Goals
• Increase your knowledge and understanding of what is protected health
information (PHI) and how to maintain its security
• Enhance your awareness of your role in assisting in following the HIPAA
Security Rule
• Learn about privacy and the security of information created, maintained,
and transmitted in electronic format, and Inform the workforce about
their reporting responsibilities for HIPAA violations and the possible
penalties for violation of HIPAA law for both you and the this hospital
• Protect the confidentiality and security of PHI
Requirement of HIPPA in Healthcare
• The increasing use of the internet, involving
the storing and transferring of electronic
information, advances in genetic science, and
the concern about WHO would have access to
WHAT information, and HOW it would be used
created great concern and speculation
Requirement of HIPPA in Healthcare Cont.
• Protected Health Information (PHI) is individually identifiable health
information that is held or disclosed by a covered entity that can be
communicated electronically, verbally, or written
• Electronic Protected Health Information (EPHI) is protected health
information (PHI) that is transmitted by electronic media or maintained by
electronic media
• Sensitive Data is protected health information that can be used to
determine the identity of an individual and/or their diagnosis
Golden Security Rules
• Follow the fundamentals of secure password management
• Remember Security impacts privacy
• Adhere to Policies and Procedures regarding safeguarding buildings,
systems, and information
• Report any suspected violations of policies and procedures to your
Security Officer
• Incorporate daily work habits that protect the security and privacy of the
information you have access to
We all can support and implement to safeguard the
security and confidentiality of EPHI at our organization.
Key Practices in Handling PHI
• It is YOUR responsibility to safeguard PHI
• Assist with anticipating reasonable threats or
hazards and protect against use or disclosure
of EPHI that is not permitted or required
under the Privacy Rule
• We must ensure and monitor compliance with
the Security Rule by our faculty and staff.
Actions Taken to Safeguard PHI
• When PHI is in public’s view, cover the file, turn it over. (i.e. screen cover for the
computer screen, colored paper over files)
• When speaking of patients, try to prevent others from overhearing the
conversation
• Hold conversations about patients in private areas, and do not discuss patients
while you are in elevators or other public areas
• When medical records are not in use, store them in offices, shelves or filing
cabinets.
• Remove patient documents from faxes and copiers as soon as you can.
• When disposing documents containing PHI, follow the procedures for disposal of
such documents
• Use only the MINIMUM Information necessary
• Check the motive/reasoning behind usage of the information
Consequences Of Breaching Patient
Confidentiality
• This company has ZERO tolerance for the
breach of PHI not used by the authorized staff
and authorized reasons.
• It is an AUTOMATIC TERMINATION once
investigation confirms breach of usage of
patients’ PHI.
• So, please follow the guidelines in place as we
care for our patients.
References
• Kongstvedt, P. R. (2007) Essentials of managed
health care. Sudbury, MA: Jones and Bartlett
• www.hippa.gov

Mais conteúdo relacionado

Mais procurados (19)

TaylorWk1d2assignment
TaylorWk1d2assignmentTaylorWk1d2assignment
TaylorWk1d2assignment
 
Mha690 wk 1 fletcher
Mha690 wk 1   fletcherMha690 wk 1   fletcher
Mha690 wk 1 fletcher
 
MHA690 confidentiality training
MHA690 confidentiality trainingMHA690 confidentiality training
MHA690 confidentiality training
 
HIPAA Audit Implementation
HIPAA Audit ImplementationHIPAA Audit Implementation
HIPAA Audit Implementation
 
Hipaa slideshare ppt
Hipaa slideshare pptHipaa slideshare ppt
Hipaa slideshare ppt
 
UCLA compliance training
UCLA compliance trainingUCLA compliance training
UCLA compliance training
 
Hippa
HippaHippa
Hippa
 
Hipaa training by p. lynch
Hipaa training by p. lynchHipaa training by p. lynch
Hipaa training by p. lynch
 
Week 1 discussion 2 confidentiality
Week 1 discussion 2 confidentialityWeek 1 discussion 2 confidentiality
Week 1 discussion 2 confidentiality
 
Presentation5
Presentation5Presentation5
Presentation5
 
Confidentiality 9.26.13
Confidentiality 9.26.13Confidentiality 9.26.13
Confidentiality 9.26.13
 
Hipaa basics.pp2
Hipaa basics.pp2Hipaa basics.pp2
Hipaa basics.pp2
 
Hippa privacy
Hippa privacyHippa privacy
Hippa privacy
 
Legal implications of HIPAA, HITECH and BAAs
Legal implications of HIPAA, HITECH and BAAsLegal implications of HIPAA, HITECH and BAAs
Legal implications of HIPAA, HITECH and BAAs
 
Understanding the HIPPA Act
Understanding the HIPPA ActUnderstanding the HIPPA Act
Understanding the HIPPA Act
 
Introduction hippaa
Introduction hippaaIntroduction hippaa
Introduction hippaa
 
Week 1 discussion 2 confidentiality final
Week 1 discussion 2 confidentiality finalWeek 1 discussion 2 confidentiality final
Week 1 discussion 2 confidentiality final
 
PROTECTED HEALTH INFORMATION_PATIENT PRIVACY
PROTECTED HEALTH INFORMATION_PATIENT PRIVACYPROTECTED HEALTH INFORMATION_PATIENT PRIVACY
PROTECTED HEALTH INFORMATION_PATIENT PRIVACY
 
Phi masella
Phi masellaPhi masella
Phi masella
 

Semelhante a Mha 690 week 1 discussion presentation

Patient confidentiality training
Patient confidentiality  trainingPatient confidentiality  training
Patient confidentiality training
twhit0623
 
Health Information Technology_272_Presentation_CookDaryle.docx.
Health Information Technology_272_Presentation_CookDaryle.docx.Health Information Technology_272_Presentation_CookDaryle.docx.
Health Information Technology_272_Presentation_CookDaryle.docx.
Daryle Cook
 
Patient confidentiality.ppt
Patient confidentiality.pptPatient confidentiality.ppt
Patient confidentiality.ppt
chwiso8418
 
Patient confidentiality power point
Patient confidentiality power pointPatient confidentiality power point
Patient confidentiality power point
chwiso8418
 
Patient confidentiality power point
Patient confidentiality power pointPatient confidentiality power point
Patient confidentiality power point
chwiso8418
 
Confidentiality in the healthcare system
Confidentiality in the healthcare systemConfidentiality in the healthcare system
Confidentiality in the healthcare system
pfor2012
 
Training on confidentiality MHA690 Hayden
Training on confidentiality MHA690 HaydenTraining on confidentiality MHA690 Hayden
Training on confidentiality MHA690 Hayden
haydens
 

Semelhante a Mha 690 week 1 discussion presentation (20)

Hipaa overview 073118
Hipaa overview 073118Hipaa overview 073118
Hipaa overview 073118
 
Are You HIPAA Safe?
Are You HIPAA Safe?Are You HIPAA Safe?
Are You HIPAA Safe?
 
Week 1 discussion patient confidentiality
Week 1 discussion  patient confidentialityWeek 1 discussion  patient confidentiality
Week 1 discussion patient confidentiality
 
HIPAA Compliance For Small Practices
HIPAA Compliance For Small PracticesHIPAA Compliance For Small Practices
HIPAA Compliance For Small Practices
 
health insurance portability and accountability act.pptx
health insurance portability and accountability act.pptxhealth insurance portability and accountability act.pptx
health insurance portability and accountability act.pptx
 
Patient confidentiality training
Patient confidentiality  trainingPatient confidentiality  training
Patient confidentiality training
 
HIPAA and Privacy Training
HIPAA and Privacy TrainingHIPAA and Privacy Training
HIPAA and Privacy Training
 
Health Information Technology_272_Presentation_CookDaryle.docx.
Health Information Technology_272_Presentation_CookDaryle.docx.Health Information Technology_272_Presentation_CookDaryle.docx.
Health Information Technology_272_Presentation_CookDaryle.docx.
 
HIPAA
HIPAAHIPAA
HIPAA
 
Hipaa and social media using new
Hipaa and social media using newHipaa and social media using new
Hipaa and social media using new
 
Patient confidentiality.ppt
Patient confidentiality.pptPatient confidentiality.ppt
Patient confidentiality.ppt
 
Patient confidentiality power point
Patient confidentiality power pointPatient confidentiality power point
Patient confidentiality power point
 
Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentiality
 
Patient confidentiality power point
Patient confidentiality power pointPatient confidentiality power point
Patient confidentiality power point
 
Dustin HIPAA
Dustin HIPAADustin HIPAA
Dustin HIPAA
 
Confidentiality in the healthcare system
Confidentiality in the healthcare systemConfidentiality in the healthcare system
Confidentiality in the healthcare system
 
Hipaa training
Hipaa trainingHipaa training
Hipaa training
 
Training on confidentiality MHA690 Hayden
Training on confidentiality MHA690 HaydenTraining on confidentiality MHA690 Hayden
Training on confidentiality MHA690 Hayden
 
Final copy 7
Final copy 7Final copy 7
Final copy 7
 
Hippa privacy and security awareness
Hippa privacy and security awarenessHippa privacy and security awareness
Hippa privacy and security awareness
 

Último

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Último (20)

SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 

Mha 690 week 1 discussion presentation

  • 1. Mandatory HIPPA Training and its Importance Falane J. St. Jean MHA 690 Week 1:Dicussion 2 February 2, 2012
  • 2. Keep under lock and key!!! Confidentiality of Patients PHI
  • 3. HIPPA and Its Importance • HIPAA stands for Health Insurance Portability and Accountability Act of 1996 and is composed of three components: • Insurance Portability • Fraud Enforcement • Administrative Simplification
  • 4. HIPPA and Its Importance Cont. • The Health Insurance Portability and Accountability Act (HIPAA) of 1996 established guidelines and regulations for the use and disclosure of information about patients’ records (www.hippa.gov). • HIPAA also requires that electronic health transactions be standardized to improve the efficiency and effectiveness in the United State’s health care system via strengthening the use of electronic data (Kongstvedt, P. R.,2007). • Department of Health and Human Services (HHS) Office for Civil Rights (OCR) is responsible for enforcing the Privacy and Security Rules enforcement of HIPAA (www.hippa.gov).
  • 5. HIPPA and Its Importance Continued • This session will focus on the Security Rule section of HIPAA and the responsibilities of units or entities to protect and safeguard the confidentiality of PHI that is either created, maintained, and transmitted in electronic form.
  • 6. HIPPA Presentation Goals • Increase your knowledge and understanding of what is protected health information (PHI) and how to maintain its security • Enhance your awareness of your role in assisting in following the HIPAA Security Rule • Learn about privacy and the security of information created, maintained, and transmitted in electronic format, and Inform the workforce about their reporting responsibilities for HIPAA violations and the possible penalties for violation of HIPAA law for both you and the this hospital • Protect the confidentiality and security of PHI
  • 7. Requirement of HIPPA in Healthcare • The increasing use of the internet, involving the storing and transferring of electronic information, advances in genetic science, and the concern about WHO would have access to WHAT information, and HOW it would be used created great concern and speculation
  • 8. Requirement of HIPPA in Healthcare Cont. • Protected Health Information (PHI) is individually identifiable health information that is held or disclosed by a covered entity that can be communicated electronically, verbally, or written • Electronic Protected Health Information (EPHI) is protected health information (PHI) that is transmitted by electronic media or maintained by electronic media • Sensitive Data is protected health information that can be used to determine the identity of an individual and/or their diagnosis
  • 9. Golden Security Rules • Follow the fundamentals of secure password management • Remember Security impacts privacy • Adhere to Policies and Procedures regarding safeguarding buildings, systems, and information • Report any suspected violations of policies and procedures to your Security Officer • Incorporate daily work habits that protect the security and privacy of the information you have access to We all can support and implement to safeguard the security and confidentiality of EPHI at our organization.
  • 10. Key Practices in Handling PHI • It is YOUR responsibility to safeguard PHI • Assist with anticipating reasonable threats or hazards and protect against use or disclosure of EPHI that is not permitted or required under the Privacy Rule • We must ensure and monitor compliance with the Security Rule by our faculty and staff.
  • 11. Actions Taken to Safeguard PHI • When PHI is in public’s view, cover the file, turn it over. (i.e. screen cover for the computer screen, colored paper over files) • When speaking of patients, try to prevent others from overhearing the conversation • Hold conversations about patients in private areas, and do not discuss patients while you are in elevators or other public areas • When medical records are not in use, store them in offices, shelves or filing cabinets. • Remove patient documents from faxes and copiers as soon as you can. • When disposing documents containing PHI, follow the procedures for disposal of such documents • Use only the MINIMUM Information necessary • Check the motive/reasoning behind usage of the information
  • 12. Consequences Of Breaching Patient Confidentiality • This company has ZERO tolerance for the breach of PHI not used by the authorized staff and authorized reasons. • It is an AUTOMATIC TERMINATION once investigation confirms breach of usage of patients’ PHI. • So, please follow the guidelines in place as we care for our patients.
  • 13. References • Kongstvedt, P. R. (2007) Essentials of managed health care. Sudbury, MA: Jones and Bartlett • www.hippa.gov