SlideShare uma empresa Scribd logo
1 de 10
CONFIDENTIALITY
Marcuse Dezir
MHA 690 Health Care Capstone
Instructor: Hwang-Ji Lu
09/26/2013
IMPORTANCE OF PRIVACY
Privacy within the healthcare is very important and probably the most difficult
thing to do as well. Lack of resources, lack of internal control over patient
information and lack of training leaves many healthcare organizations ill-
prepared to address privacy and security risks and medical fraud. Information
security and privacy in healthcare are very important matters that need to be
addressed and find solution that will benefit everyone involved. Privacy
protection should be every organization main concern because everyone
would like for their organizations or business to be secure and protected from
all things
MANAGER’S ROLE
As a manager I would I use Slideshare as Web 2.0 tool to train all staff members; All staff members should
have training at least every six months or annually on confidentially simply because the staff members are
dealing and have access to personal and sensitive information’s. The training should include the HIPPA
security regulations because staff members need to be up to date on the latest security systems and
regulations. Staff members should know that there can be serious complications for violating patient
privacy or breach of contract. A lot of companies give handbooks to all their employees that covered
company’s policy and regulation and if employees violated any of those policies under any
circumstances, then the employees should be aware of the consequences to pay for their actions. Above all
things it’s very important to make sure all employees/staff members read and sign the handbook
regulations and company policy before starting the new position. The company should also give all
employees a copy of the regulation signed for they files. Bottom line it’s important to respect people’s
privacy and it doesn’t matter whether it’s a well-known celebrity or a regular patient, the health care
facility is entitle to respect and protect the patient privacy because we wouldn’t want our information out
there for the world to know.
PRICE TO PAY
Knowing that all staff members and employees have read and sign the
disclose information about their role on the job. If violated for any reasons
certain action need to take place. Of course it will depend on the violation
committed by the staff member/employee then the manager will know what
action to take. The result of the violation can be suspension, termination or
anything the manager find appropriate. Bottom line we all know there’s
always consequences to pay for our actions and that too should also take
effect the work place.
HIPAA TRAINING
The online HIPAA training course helps teach HR managers and employees
HIPAA privacy and security laws. The HIPAA compliance training program
helps companies involved in the healthcare industry better protect the privacy
and security of personal information and patient data. HIPAA compliance is
essential in healthcare, where individuals share details of their health, personal
lives and finances when they are at their most vulnerable. The Health
Insurance Portability and Accountability Act ("HIPAA") addresses these issues
by imposing stringent privacy and security requirements on healthcare
providers and their business associates
PRIVACY PROTECTION
Protecting privacy is important not just to avoid harm, but because good
healthcare depends on accurate and reliable information believes that
privacy and security protections will build public trust, which is crucial if the
benefits of health IT are to be realized. A comprehensive privacy and security
framework must be implemented by all stakeholders engaged in e-health
efforts. Such a framework, as outlined for Health, would include:
• Implement core privacy principles;
• Adopt trusted network design characteristics;
• Establish oversight and accountability mechanisms.
• Establish oversight and accountability mechanisms.
IMPLEMENTATION
The framework should be implemented in part by strengthening the HIPAA
Privacy Regulation for records kept by the traditional health system
participants, but also needs to address the increased migration of personal
health information out of the traditional medical system. The Privacy and
Security Framework emphasizes the concept that trust in electronic health
information exchange can best be established in an open and transparent
environment. It also stresses that it is important for individuals to understand
what individually identifiable health information exists about them, how that
information is collected, used, and disclosed, and how reasonable choices
can be exercised with respect to that information.
ENFORCE TRAINING
Many times we are worry about the external aspect of security and forget about the internal, but all types
of security are important. Internal security is even more important because we have all kind of people
inside the facility, some can be trusted and others you just don’t know where they stand. Let’s not forget
that problems will occur, for example staff member may lose identification and not reported it to the
head of security or the charge nurse or doctor. Other times people let colleagues borrow their access card
to the facility. These are the issue that organizations, physicians need to really get control over. They
have been able to use other people’s identity for criminal purposes, but the bad part of it all sometimes
there is no easy way to know the real person. It is also important to keep in mind that they are hackers
out there. Hackers can use computer viruses to get into personal files such as emails and/or propagate
their nastiness by sending new emails that looks as if someone their know may have sent it, like friend
and family. While it is a good and secure idea as part of the training for every single staff
members/employees to have their own login names and password, it should also be enforce those
information need to really be secret because security is too important and they are lot at risk for either
the organization, the patients and/or the staff members as well.
CONCLUSION
Confidentiality is important to everyone whether in our surrounding or the
working place. Knowing that as human being there are certain information we
may or may not want people to know, therefore the same should be in the
work place. It doesn’t matter whether it’s a well known person or just an
everyday person, staff members/ employees have no right to go thru those
people files especially when it has nothing to do with they work. Confidentially
should never be broken under no circumstances and if someone violated
those simple rule, they should pay the price of their actions.
REFERENCES
HIPAA Privacy and Security Training http://www.wecomply.com/ethics-
training/122103-hipaa-privacy-and-security-compliance-training-courses-
classes
Comprehensive privacy and security: critical for health information technology
version 1.0 may 2008
https://www.cdt.org/healthprivacy/20080514HPframe.pdf
Protecting patient privacy and security in healthcare information system
http://www.hhs.gov/testify/2007/06/t20070619b.html

Mais conteúdo relacionado

Mais procurados

confidentiality in the workplace
confidentiality in the workplaceconfidentiality in the workplace
confidentiality in the workplaceNova Zamora
 
Hippa slide show
Hippa slide showHippa slide show
Hippa slide showheathercool
 
Confidentiality
Confidentiality Confidentiality
Confidentiality pcsamuels10
 
Mandatory hippa and information security
Mandatory hippa and information securityMandatory hippa and information security
Mandatory hippa and information securityHiggi123
 
Patient confidentiality seminar
Patient confidentiality seminarPatient confidentiality seminar
Patient confidentiality seminarLakisha M. Moore
 
Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentialityptamayo1958
 
Confidentiality
ConfidentialityConfidentiality
ConfidentialityDeniseMHA
 
Confidentiality
ConfidentialityConfidentiality
ConfidentialityBeautie1
 
Mha 690 discussion 1 2
Mha 690 discussion 1 2Mha 690 discussion 1 2
Mha 690 discussion 1 2radark-9
 
Confidentiality in the Workplace
Confidentiality in the WorkplaceConfidentiality in the Workplace
Confidentiality in the Workplacesalvarez63
 
Privacy and confidentiality
Privacy and confidentialityPrivacy and confidentiality
Privacy and confidentialityjohnzinn
 
Health care confidentiality and privacy
Health care confidentiality and privacyHealth care confidentiality and privacy
Health care confidentiality and privacysawanda
 
Confidentiality
ConfidentialityConfidentiality
Confidentialitydrrn1
 
Confidentiality in Healthcare
Confidentiality in HealthcareConfidentiality in Healthcare
Confidentiality in Healthcarekmasterson
 

Mais procurados (19)

Mha wk 1 dis 2
Mha wk 1 dis 2Mha wk 1 dis 2
Mha wk 1 dis 2
 
confidentiality in the workplace
confidentiality in the workplaceconfidentiality in the workplace
confidentiality in the workplace
 
Hippa slide show
Hippa slide showHippa slide show
Hippa slide show
 
Confidentiality
Confidentiality Confidentiality
Confidentiality
 
Mandatory hippa and information security
Mandatory hippa and information securityMandatory hippa and information security
Mandatory hippa and information security
 
Patient confidentiality seminar
Patient confidentiality seminarPatient confidentiality seminar
Patient confidentiality seminar
 
Hippa laws
Hippa lawsHippa laws
Hippa laws
 
Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentiality
 
Hipaa slideshow
Hipaa slideshowHipaa slideshow
Hipaa slideshow
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Hippa
HippaHippa
Hippa
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Mha 690 discussion 1 2
Mha 690 discussion 1 2Mha 690 discussion 1 2
Mha 690 discussion 1 2
 
Confidentiality in the Workplace
Confidentiality in the WorkplaceConfidentiality in the Workplace
Confidentiality in the Workplace
 
Privacy and confidentiality
Privacy and confidentialityPrivacy and confidentiality
Privacy and confidentiality
 
Health care confidentiality and privacy
Health care confidentiality and privacyHealth care confidentiality and privacy
Health care confidentiality and privacy
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Confidentiality in Healthcare
Confidentiality in HealthcareConfidentiality in Healthcare
Confidentiality in Healthcare
 

Destaque

Confidentiality and Data Protection
Confidentiality and Data ProtectionConfidentiality and Data Protection
Confidentiality and Data ProtectionEd Horowicz
 
The importance of confidentiality
The importance of confidentialityThe importance of confidentiality
The importance of confidentialityMOTHOM0556
 
Mha 690 confidentiality - peric
Mha 690   confidentiality - pericMha 690   confidentiality - peric
Mha 690 confidentiality - pericDMPeric72
 
Introduction to Lean and PDSA Thinking
Introduction to Lean and PDSA ThinkingIntroduction to Lean and PDSA Thinking
Introduction to Lean and PDSA ThinkingRachel Janzen
 
Cutting costs, improving quality, & speeding delivery through continous impro...
Cutting costs, improving quality, & speeding delivery through continous impro...Cutting costs, improving quality, & speeding delivery through continous impro...
Cutting costs, improving quality, & speeding delivery through continous impro...Eng Marzouk
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA BasicsKarna *
 
Research Presentation Format
Research Presentation FormatResearch Presentation Format
Research Presentation FormatLifelong Learning
 
The importance of confidentiality
The importance of confidentialityThe importance of confidentiality
The importance of confidentialityswilson0050
 

Destaque (12)

Mha 690 week 1 dq 2
Mha 690 week 1 dq 2Mha 690 week 1 dq 2
Mha 690 week 1 dq 2
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Tasia Confidentiality PPT
Tasia Confidentiality PPTTasia Confidentiality PPT
Tasia Confidentiality PPT
 
Confidentiality and Data Protection
Confidentiality and Data ProtectionConfidentiality and Data Protection
Confidentiality and Data Protection
 
The importance of confidentiality
The importance of confidentialityThe importance of confidentiality
The importance of confidentiality
 
Mha 690 confidentiality - peric
Mha 690   confidentiality - pericMha 690   confidentiality - peric
Mha 690 confidentiality - peric
 
Bringing lean to life
Bringing lean to lifeBringing lean to life
Bringing lean to life
 
Introduction to Lean and PDSA Thinking
Introduction to Lean and PDSA ThinkingIntroduction to Lean and PDSA Thinking
Introduction to Lean and PDSA Thinking
 
Cutting costs, improving quality, & speeding delivery through continous impro...
Cutting costs, improving quality, & speeding delivery through continous impro...Cutting costs, improving quality, & speeding delivery through continous impro...
Cutting costs, improving quality, & speeding delivery through continous impro...
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA Basics
 
Research Presentation Format
Research Presentation FormatResearch Presentation Format
Research Presentation Format
 
The importance of confidentiality
The importance of confidentialityThe importance of confidentiality
The importance of confidentiality
 

Semelhante a Health care capstone week 1 disk 1 confidentiality

Confidentiality
ConfidentialityConfidentiality
Confidentialityrobyn42
 
Everlyn moore health care capstone
Everlyn moore health care capstoneEverlyn moore health care capstone
Everlyn moore health care capstoneevelynmoore
 
HIPAA Compliance Email
HIPAA Compliance EmailHIPAA Compliance Email
HIPAA Compliance EmailL Andersen
 
Discussion2
Discussion2 Discussion2
Discussion2 amberlinn
 
Patient confedentiality ppt
Patient confedentiality pptPatient confedentiality ppt
Patient confedentiality pptYuli Vargas
 
Week 1 discussion 2
Week 1 discussion 2Week 1 discussion 2
Week 1 discussion 2girly12
 
Jeanette Rankins Patient Privacy Training
Jeanette Rankins Patient Privacy TrainingJeanette Rankins Patient Privacy Training
Jeanette Rankins Patient Privacy TrainingJeanetteRankins
 
How to Ensure HIPPA Compliance
How to Ensure HIPPA ComplianceHow to Ensure HIPPA Compliance
How to Ensure HIPPA ComplianceHanna Global
 
The Basics of Protecting PHI - Best Practices When Working with Business Asso...
The Basics of Protecting PHI - Best Practices When Working with Business Asso...The Basics of Protecting PHI - Best Practices When Working with Business Asso...
The Basics of Protecting PHI - Best Practices When Working with Business Asso...Endeavor Management
 
Week 1 dq1
Week 1 dq1Week 1 dq1
Week 1 dq1SNikki
 
Training on confidentiality MHA690 Hayden
Training on confidentiality MHA690 HaydenTraining on confidentiality MHA690 Hayden
Training on confidentiality MHA690 Haydenhaydens
 
Mha690 week one discussion two
Mha690 week one discussion twoMha690 week one discussion two
Mha690 week one discussion twojeanne2204
 

Semelhante a Health care capstone week 1 disk 1 confidentiality (20)

Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Everlyn moore health care capstone
Everlyn moore health care capstoneEverlyn moore health care capstone
Everlyn moore health care capstone
 
HIPAA Compliance Email
HIPAA Compliance EmailHIPAA Compliance Email
HIPAA Compliance Email
 
Training
Training Training
Training
 
Discussion2
Discussion2 Discussion2
Discussion2
 
Hippa powerpoint 92613
Hippa powerpoint 92613Hippa powerpoint 92613
Hippa powerpoint 92613
 
Hippa powerpoint 92613
Hippa powerpoint 92613Hippa powerpoint 92613
Hippa powerpoint 92613
 
Patient confedentiality ppt
Patient confedentiality pptPatient confedentiality ppt
Patient confedentiality ppt
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Data protection in HR
Data protection in HRData protection in HR
Data protection in HR
 
Week 1 discussion 2
Week 1 discussion 2Week 1 discussion 2
Week 1 discussion 2
 
Mha.690
Mha.690Mha.690
Mha.690
 
Jeanette Rankins Patient Privacy Training
Jeanette Rankins Patient Privacy TrainingJeanette Rankins Patient Privacy Training
Jeanette Rankins Patient Privacy Training
 
How to Ensure HIPPA Compliance
How to Ensure HIPPA ComplianceHow to Ensure HIPPA Compliance
How to Ensure HIPPA Compliance
 
The Basics of Protecting PHI - Best Practices When Working with Business Asso...
The Basics of Protecting PHI - Best Practices When Working with Business Asso...The Basics of Protecting PHI - Best Practices When Working with Business Asso...
The Basics of Protecting PHI - Best Practices When Working with Business Asso...
 
Week 1 dq1
Week 1 dq1Week 1 dq1
Week 1 dq1
 
Training on confidentiality MHA690 Hayden
Training on confidentiality MHA690 HaydenTraining on confidentiality MHA690 Hayden
Training on confidentiality MHA690 Hayden
 
Week 1 confidentiality
Week 1 confidentialityWeek 1 confidentiality
Week 1 confidentiality
 
HIPAA Presentation
HIPAA PresentationHIPAA Presentation
HIPAA Presentation
 
Mha690 week one discussion two
Mha690 week one discussion twoMha690 week one discussion two
Mha690 week one discussion two
 

Último

CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 

Último (20)

CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 

Health care capstone week 1 disk 1 confidentiality

  • 1. CONFIDENTIALITY Marcuse Dezir MHA 690 Health Care Capstone Instructor: Hwang-Ji Lu 09/26/2013
  • 2. IMPORTANCE OF PRIVACY Privacy within the healthcare is very important and probably the most difficult thing to do as well. Lack of resources, lack of internal control over patient information and lack of training leaves many healthcare organizations ill- prepared to address privacy and security risks and medical fraud. Information security and privacy in healthcare are very important matters that need to be addressed and find solution that will benefit everyone involved. Privacy protection should be every organization main concern because everyone would like for their organizations or business to be secure and protected from all things
  • 3. MANAGER’S ROLE As a manager I would I use Slideshare as Web 2.0 tool to train all staff members; All staff members should have training at least every six months or annually on confidentially simply because the staff members are dealing and have access to personal and sensitive information’s. The training should include the HIPPA security regulations because staff members need to be up to date on the latest security systems and regulations. Staff members should know that there can be serious complications for violating patient privacy or breach of contract. A lot of companies give handbooks to all their employees that covered company’s policy and regulation and if employees violated any of those policies under any circumstances, then the employees should be aware of the consequences to pay for their actions. Above all things it’s very important to make sure all employees/staff members read and sign the handbook regulations and company policy before starting the new position. The company should also give all employees a copy of the regulation signed for they files. Bottom line it’s important to respect people’s privacy and it doesn’t matter whether it’s a well-known celebrity or a regular patient, the health care facility is entitle to respect and protect the patient privacy because we wouldn’t want our information out there for the world to know.
  • 4. PRICE TO PAY Knowing that all staff members and employees have read and sign the disclose information about their role on the job. If violated for any reasons certain action need to take place. Of course it will depend on the violation committed by the staff member/employee then the manager will know what action to take. The result of the violation can be suspension, termination or anything the manager find appropriate. Bottom line we all know there’s always consequences to pay for our actions and that too should also take effect the work place.
  • 5. HIPAA TRAINING The online HIPAA training course helps teach HR managers and employees HIPAA privacy and security laws. The HIPAA compliance training program helps companies involved in the healthcare industry better protect the privacy and security of personal information and patient data. HIPAA compliance is essential in healthcare, where individuals share details of their health, personal lives and finances when they are at their most vulnerable. The Health Insurance Portability and Accountability Act ("HIPAA") addresses these issues by imposing stringent privacy and security requirements on healthcare providers and their business associates
  • 6. PRIVACY PROTECTION Protecting privacy is important not just to avoid harm, but because good healthcare depends on accurate and reliable information believes that privacy and security protections will build public trust, which is crucial if the benefits of health IT are to be realized. A comprehensive privacy and security framework must be implemented by all stakeholders engaged in e-health efforts. Such a framework, as outlined for Health, would include: • Implement core privacy principles; • Adopt trusted network design characteristics; • Establish oversight and accountability mechanisms. • Establish oversight and accountability mechanisms.
  • 7. IMPLEMENTATION The framework should be implemented in part by strengthening the HIPAA Privacy Regulation for records kept by the traditional health system participants, but also needs to address the increased migration of personal health information out of the traditional medical system. The Privacy and Security Framework emphasizes the concept that trust in electronic health information exchange can best be established in an open and transparent environment. It also stresses that it is important for individuals to understand what individually identifiable health information exists about them, how that information is collected, used, and disclosed, and how reasonable choices can be exercised with respect to that information.
  • 8. ENFORCE TRAINING Many times we are worry about the external aspect of security and forget about the internal, but all types of security are important. Internal security is even more important because we have all kind of people inside the facility, some can be trusted and others you just don’t know where they stand. Let’s not forget that problems will occur, for example staff member may lose identification and not reported it to the head of security or the charge nurse or doctor. Other times people let colleagues borrow their access card to the facility. These are the issue that organizations, physicians need to really get control over. They have been able to use other people’s identity for criminal purposes, but the bad part of it all sometimes there is no easy way to know the real person. It is also important to keep in mind that they are hackers out there. Hackers can use computer viruses to get into personal files such as emails and/or propagate their nastiness by sending new emails that looks as if someone their know may have sent it, like friend and family. While it is a good and secure idea as part of the training for every single staff members/employees to have their own login names and password, it should also be enforce those information need to really be secret because security is too important and they are lot at risk for either the organization, the patients and/or the staff members as well.
  • 9. CONCLUSION Confidentiality is important to everyone whether in our surrounding or the working place. Knowing that as human being there are certain information we may or may not want people to know, therefore the same should be in the work place. It doesn’t matter whether it’s a well known person or just an everyday person, staff members/ employees have no right to go thru those people files especially when it has nothing to do with they work. Confidentially should never be broken under no circumstances and if someone violated those simple rule, they should pay the price of their actions.
  • 10. REFERENCES HIPAA Privacy and Security Training http://www.wecomply.com/ethics- training/122103-hipaa-privacy-and-security-compliance-training-courses- classes Comprehensive privacy and security: critical for health information technology version 1.0 may 2008 https://www.cdt.org/healthprivacy/20080514HPframe.pdf Protecting patient privacy and security in healthcare information system http://www.hhs.gov/testify/2007/06/t20070619b.html