SlideShare uma empresa Scribd logo
1 de 10
Confidentiality, Security, and
Integrity of Information
Confidentiality, Security, and
Integrity of Information
 Introduction
    This purpose of this training program is to educate and inform all users
     of Protected Health Information (PHI), of the requirements set forth
     by the Health Insurance Portability and Accountability Act of 1996
     (HIPPA).
    The U.S. Department of Health and Human Services issued a “Privacy
     Rule” to implement the requirements set forth by HIPPA.
    The Privacy Rule standards address the use and disclosure of
     individuals’ health information by organizations (covered entities) who
     are subject to the Privacy Rule.
Confidentiality, Security, and
Integrity of Information
 Who Is Covered by the Privacy Rule?
   Health plans: Individual and group plans that provide or pay the cost
    of medical care.

    Health Care Providers: Every health care provider, regardless of size,
     who electronically transmits health information in connection with
     certain transactions, is a covered entity. Health care providers include
     all:

         “providers of services” (e.g., institutional providers such as
          hospitals) and;

          “providers of medical or health services” (e.g., non-institutional
          providers such as physicians, dentists, and other practitioners) as
          defined by Medicare, and any other person or organization that
          furnishes, bills, or is paid for health care.
Confidentiality, Security, and
Integrity of Information

   Health Care Clearinghouses: Entities that process nonstandard
    information they receive from another entity into a standard format or
    data content. These include billing services, repricing companies,
    community health management information systems, and value-added
    networks and switches if these entities perform clearinghouse
    functions.
Confidentiality, Security, and
Integrity of Information
 What Information is Protected?
    Protected Health Information: All “individually identifiable health
     information” held or transmitted by a covered entity or its business
     associate, in any form or media, whether electronic, paper or oral,
     including demographic data that relates to:
      The individual’s past, present or future physical or mental health
        condition,
      The provision of health care to the individual, or
      The past, present, or future payment for the provision of health care to
        the individual,
      Individually identifiable health information such as:
          Name
          Address
          Birth date and,
          Social Security Number
Confidentiality, Security, and
Integrity of Information
 General Principals for Uses and Disclosures:
    A covered entity may not use or disclose protected health information,
     except to:
      Those entities that have a “need to know” such as billing agencies or
        regulatory bodies and as outlined in the Privacy Rule
      The individual who is the subject of the information (or the
        individual’s personal representative) as authorized in writing.
      Required Disclosures which include:

          To individuals (or their personal representatives) specifically
           when they request access to, or an accounting of disclosures of,
           their protected health information; and
          To HHS when it is undertaking a compliance investigation or
           review or enforcement action.
Confidentiality, Security, and
Integrity of Information
 Notice and Other Individual Rights
    Each covered entity, with certain exceptions, must provide a notice of
     its privacy practices and must contain certain elements:
      Ways in which the entity may use and disclose PHI

      The entity’s duties to protect privacy, provide a notice of privacy
        practices, and abide by the terms of the current notice.
      Describes the individuals’ rights, including the right to complain to
        HHS and to the covered entity if they believe their privacy rights
        have been violated.
      Must include a point of contact for further information and for
        making complaints to the covered entity.
Confidentiality, Security, and
Integrity of Information
 Enforcement and Penalties for Noncompliance:
    Termination of employment for violation of HIPPA policy.
    Civil penalties to entity of $100 per failure to comply with a Privacy Rule
     requirement.
    Individual fine of $50,000 and up to one year imprisonment.
    The criminal penalties increase to $100,000 and up to five years
     imprisonment if the wrongful conduct involves false pretenses, and to
     $250,000 and up to ten years imprisonment if the wrongful conduct
     involves the intent to sell, transfer, or use individually identifiable
     health information for commercial advantage, personal gain, or
     malicious harm.
Confidentiality, Security, and
Integrity of Information
 What is Your Role?
   Ensure that patient information is not disclosed improperly but logging
      off computer terminals and keeping records within the appropriate
      setting.
     Do not discuss through social media or in areas outside of the clinical
      area patient information.
     Do not share information about patients with friends or family.
     Discuss patient information only with those “covered entities” as
      outlined by the Privacy Rule.
     Do not give your computer password to anyone.
Confidentiality, Security, and
Integrity of Information
 References:
   Summary of the HIPPA Privacy Rule, Office For Civil Rights; United
    States Department of Health and Human Resources 05/03,
    www.hhs.gov/ocr/privacy/hipaa/understanding/summary/ind;
    retrieved November 13, 2012.

Mais conteúdo relacionado

Mais procurados

Patient confidentiality seminar
Patient confidentiality seminarPatient confidentiality seminar
Patient confidentiality seminarLakisha M. Moore
 
Training presentation week 1 kristin williford
Training presentation week 1 kristin willifordTraining presentation week 1 kristin williford
Training presentation week 1 kristin willifordkewrnrdh
 
Confidentiality presentation(1)
Confidentiality presentation(1)Confidentiality presentation(1)
Confidentiality presentation(1)Kimberlin1
 
Week 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy trainingWeek 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy trainingvrgill22
 
Rajeev Sharma - Ontario health privacy law
Rajeev Sharma - Ontario health privacy law Rajeev Sharma - Ontario health privacy law
Rajeev Sharma - Ontario health privacy law Omar Ha-Redeye
 
HIPAA Training Basics
HIPAA Training BasicsHIPAA Training Basics
HIPAA Training Basicssecky65
 
HIPAA Training - 2011
HIPAA Training - 2011HIPAA Training - 2011
HIPAA Training - 2011darichardson
 
Patient confidentiality MHA 690
Patient confidentiality MHA 690Patient confidentiality MHA 690
Patient confidentiality MHA 690AMSIMM9932
 
Privacy & security training.pptx
Privacy & security training.pptxPrivacy & security training.pptx
Privacy & security training.pptxQmcleod
 
Mha 690 week one discussion ii
Mha 690 week one discussion iiMha 690 week one discussion ii
Mha 690 week one discussion iibeleza1669
 
Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)bholmes
 
HIPPA and EMR Core Education Training
HIPPA and EMR Core Education TrainingHIPPA and EMR Core Education Training
HIPPA and EMR Core Education TrainingAndreaSchullerMPACBI
 
Hippa final JU nursing informatics
Hippa final JU nursing informaticsHippa final JU nursing informatics
Hippa final JU nursing informaticskmcanty
 
Hipaa basics pp2
Hipaa basics pp2Hipaa basics pp2
Hipaa basics pp2martykoepke
 

Mais procurados (16)

Patient confidentiality seminar
Patient confidentiality seminarPatient confidentiality seminar
Patient confidentiality seminar
 
Hipaa slideshow
Hipaa slideshowHipaa slideshow
Hipaa slideshow
 
Training presentation week 1 kristin williford
Training presentation week 1 kristin willifordTraining presentation week 1 kristin williford
Training presentation week 1 kristin williford
 
Confidentiality presentation(1)
Confidentiality presentation(1)Confidentiality presentation(1)
Confidentiality presentation(1)
 
Week 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy trainingWeek 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy training
 
Rajeev Sharma - Ontario health privacy law
Rajeev Sharma - Ontario health privacy law Rajeev Sharma - Ontario health privacy law
Rajeev Sharma - Ontario health privacy law
 
HIPAA Training Basics
HIPAA Training BasicsHIPAA Training Basics
HIPAA Training Basics
 
HIPAA Training - 2011
HIPAA Training - 2011HIPAA Training - 2011
HIPAA Training - 2011
 
Patient confidentiality MHA 690
Patient confidentiality MHA 690Patient confidentiality MHA 690
Patient confidentiality MHA 690
 
Privacy & security training.pptx
Privacy & security training.pptxPrivacy & security training.pptx
Privacy & security training.pptx
 
Mha 690 week one discussion ii
Mha 690 week one discussion iiMha 690 week one discussion ii
Mha 690 week one discussion ii
 
Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)
 
HIPPA and EMR Core Education Training
HIPPA and EMR Core Education TrainingHIPPA and EMR Core Education Training
HIPPA and EMR Core Education Training
 
Hippa final JU nursing informatics
Hippa final JU nursing informaticsHippa final JU nursing informatics
Hippa final JU nursing informatics
 
Hipaa basics pp2
Hipaa basics pp2Hipaa basics pp2
Hipaa basics pp2
 
HIPAA Audio Presentation
HIPAA  Audio PresentationHIPAA  Audio Presentation
HIPAA Audio Presentation
 

Destaque

Inner classnotation in uml class diagram
Inner classnotation in uml class diagramInner classnotation in uml class diagram
Inner classnotation in uml class diagramIIUM
 
Safeguarding Confidentiality and Maintaining Security in Commissioning Health...
Safeguarding Confidentiality and Maintaining Security in Commissioning Health...Safeguarding Confidentiality and Maintaining Security in Commissioning Health...
Safeguarding Confidentiality and Maintaining Security in Commissioning Health...Alex Beisser MBCS
 
Chapter 2
Chapter 2Chapter 2
Chapter 2IIUM
 
Class diagram- UML diagram
Class diagram- UML diagramClass diagram- UML diagram
Class diagram- UML diagramRamakant Soni
 
Uml deployment diagram
Uml deployment diagramUml deployment diagram
Uml deployment diagramAsraa Batool
 
UML- Class Diagrams, State Machine Diagrams
UML- Class Diagrams, State Machine DiagramsUML- Class Diagrams, State Machine Diagrams
UML- Class Diagrams, State Machine DiagramsQBI Institute
 
Component and Deployment Diagram - Brief Overview
Component and Deployment Diagram - Brief OverviewComponent and Deployment Diagram - Brief Overview
Component and Deployment Diagram - Brief OverviewRajiv Kumar
 
introduction to web technology
introduction to web technologyintroduction to web technology
introduction to web technologyvikram singh
 
The importance of confidentiality
The importance of confidentialityThe importance of confidentiality
The importance of confidentialityswilson0050
 

Destaque (15)

ASE03.ppt
ASE03.pptASE03.ppt
ASE03.ppt
 
Inner classnotation in uml class diagram
Inner classnotation in uml class diagramInner classnotation in uml class diagram
Inner classnotation in uml class diagram
 
Ermodeling
ErmodelingErmodeling
Ermodeling
 
Safeguarding Confidentiality and Maintaining Security in Commissioning Health...
Safeguarding Confidentiality and Maintaining Security in Commissioning Health...Safeguarding Confidentiality and Maintaining Security in Commissioning Health...
Safeguarding Confidentiality and Maintaining Security in Commissioning Health...
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Class diagram- UML diagram
Class diagram- UML diagramClass diagram- UML diagram
Class diagram- UML diagram
 
Ooad
OoadOoad
Ooad
 
Uml deployment diagram
Uml deployment diagramUml deployment diagram
Uml deployment diagram
 
UML- Class Diagrams, State Machine Diagrams
UML- Class Diagrams, State Machine DiagramsUML- Class Diagrams, State Machine Diagrams
UML- Class Diagrams, State Machine Diagrams
 
Component and Deployment Diagram - Brief Overview
Component and Deployment Diagram - Brief OverviewComponent and Deployment Diagram - Brief Overview
Component and Deployment Diagram - Brief Overview
 
Web server
Web serverWeb server
Web server
 
introduction to web technology
introduction to web technologyintroduction to web technology
introduction to web technology
 
Web Servers (ppt)
Web Servers (ppt)Web Servers (ppt)
Web Servers (ppt)
 
PPT - Powerful Presentation Techniques
PPT - Powerful Presentation TechniquesPPT - Powerful Presentation Techniques
PPT - Powerful Presentation Techniques
 
The importance of confidentiality
The importance of confidentialityThe importance of confidentiality
The importance of confidentiality
 

Semelhante a Confidentiality, security, and integrity of information

Mha 690 week one discussion ii
Mha 690 week one discussion iiMha 690 week one discussion ii
Mha 690 week one discussion iibeleza1669
 
HIPAA Laws
HIPAA LawsHIPAA Laws
HIPAA Lawscitinfo
 
Confidentiality Training
Confidentiality TrainingConfidentiality Training
Confidentiality Trainingndejesus4
 
TaylorWk1d2assignment
TaylorWk1d2assignmentTaylorWk1d2assignment
TaylorWk1d2assignmentmya1743
 
HIPAA and FDCPA Compliance for Process Servers
HIPAA and FDCPA Compliance for Process ServersHIPAA and FDCPA Compliance for Process Servers
HIPAA and FDCPA Compliance for Process ServersLawgical
 
HIPAA Privacy Training by University of Hawaii
HIPAA Privacy Training by University of HawaiiHIPAA Privacy Training by University of Hawaii
HIPAA Privacy Training by University of HawaiiAtlantic Training, LLC.
 
HIPAA and RHIOs
HIPAA and RHIOsHIPAA and RHIOs
HIPAA and RHIOsnobumoto
 
Introduction to HIPAA and Confidentiality for Employees
Introduction to HIPAA and Confidentiality for EmployeesIntroduction to HIPAA and Confidentiality for Employees
Introduction to HIPAA and Confidentiality for EmployeesHouse of New Hope
 
Privacy & confedentiality
Privacy & confedentialityPrivacy & confedentiality
Privacy & confedentialityHemang Patel
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA BasicsKarna *
 
Healthcare Compliance and Privacy/Security Training by UCONN
Healthcare Compliance and Privacy/Security Training by UCONNHealthcare Compliance and Privacy/Security Training by UCONN
Healthcare Compliance and Privacy/Security Training by UCONNAtlantic Training, LLC.
 
Mha690 presentation by rachael javidan
Mha690 presentation by rachael javidanMha690 presentation by rachael javidan
Mha690 presentation by rachael javidanRachaelJavidan
 

Semelhante a Confidentiality, security, and integrity of information (20)

Mha 690 week one discussion ii
Mha 690 week one discussion iiMha 690 week one discussion ii
Mha 690 week one discussion ii
 
HIPAA Laws
HIPAA LawsHIPAA Laws
HIPAA Laws
 
Confidentiality Training
Confidentiality TrainingConfidentiality Training
Confidentiality Training
 
TaylorWk1d2assignment
TaylorWk1d2assignmentTaylorWk1d2assignment
TaylorWk1d2assignment
 
HIPAA and FDCPA Compliance for Process Servers
HIPAA and FDCPA Compliance for Process ServersHIPAA and FDCPA Compliance for Process Servers
HIPAA and FDCPA Compliance for Process Servers
 
HIPAA Privacy Training by University of Hawaii
HIPAA Privacy Training by University of HawaiiHIPAA Privacy Training by University of Hawaii
HIPAA Privacy Training by University of Hawaii
 
HIPAA and RHIOs
HIPAA and RHIOsHIPAA and RHIOs
HIPAA and RHIOs
 
Introduction to HIPAA and Confidentiality for Employees
Introduction to HIPAA and Confidentiality for EmployeesIntroduction to HIPAA and Confidentiality for Employees
Introduction to HIPAA and Confidentiality for Employees
 
Privacy & confedentiality
Privacy & confedentialityPrivacy & confedentiality
Privacy & confedentiality
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA Basics
 
Hipaa
HipaaHipaa
Hipaa
 
HIPAA
HIPAAHIPAA
HIPAA
 
Hipaa inservice
Hipaa inserviceHipaa inservice
Hipaa inservice
 
HIPAA
HIPAAHIPAA
HIPAA
 
HIPAA Training by UCSD
HIPAA Training by UCSDHIPAA Training by UCSD
HIPAA Training by UCSD
 
Hipaa training
Hipaa trainingHipaa training
Hipaa training
 
Annual HIPAA Training
Annual HIPAA TrainingAnnual HIPAA Training
Annual HIPAA Training
 
Healthcare Compliance and Privacy/Security Training by UCONN
Healthcare Compliance and Privacy/Security Training by UCONNHealthcare Compliance and Privacy/Security Training by UCONN
Healthcare Compliance and Privacy/Security Training by UCONN
 
Mha690 presentation by rachael javidan
Mha690 presentation by rachael javidanMha690 presentation by rachael javidan
Mha690 presentation by rachael javidan
 
Hippa training v2
Hippa training v2Hippa training v2
Hippa training v2
 

Confidentiality, security, and integrity of information

  • 2. Confidentiality, Security, and Integrity of Information  Introduction  This purpose of this training program is to educate and inform all users of Protected Health Information (PHI), of the requirements set forth by the Health Insurance Portability and Accountability Act of 1996 (HIPPA).  The U.S. Department of Health and Human Services issued a “Privacy Rule” to implement the requirements set forth by HIPPA.  The Privacy Rule standards address the use and disclosure of individuals’ health information by organizations (covered entities) who are subject to the Privacy Rule.
  • 3. Confidentiality, Security, and Integrity of Information  Who Is Covered by the Privacy Rule?  Health plans: Individual and group plans that provide or pay the cost of medical care.  Health Care Providers: Every health care provider, regardless of size, who electronically transmits health information in connection with certain transactions, is a covered entity. Health care providers include all:  “providers of services” (e.g., institutional providers such as hospitals) and;  “providers of medical or health services” (e.g., non-institutional providers such as physicians, dentists, and other practitioners) as defined by Medicare, and any other person or organization that furnishes, bills, or is paid for health care.
  • 4. Confidentiality, Security, and Integrity of Information  Health Care Clearinghouses: Entities that process nonstandard information they receive from another entity into a standard format or data content. These include billing services, repricing companies, community health management information systems, and value-added networks and switches if these entities perform clearinghouse functions.
  • 5. Confidentiality, Security, and Integrity of Information  What Information is Protected?  Protected Health Information: All “individually identifiable health information” held or transmitted by a covered entity or its business associate, in any form or media, whether electronic, paper or oral, including demographic data that relates to:  The individual’s past, present or future physical or mental health condition,  The provision of health care to the individual, or  The past, present, or future payment for the provision of health care to the individual,  Individually identifiable health information such as:  Name  Address  Birth date and,  Social Security Number
  • 6. Confidentiality, Security, and Integrity of Information  General Principals for Uses and Disclosures:  A covered entity may not use or disclose protected health information, except to:  Those entities that have a “need to know” such as billing agencies or regulatory bodies and as outlined in the Privacy Rule  The individual who is the subject of the information (or the individual’s personal representative) as authorized in writing.  Required Disclosures which include:  To individuals (or their personal representatives) specifically when they request access to, or an accounting of disclosures of, their protected health information; and  To HHS when it is undertaking a compliance investigation or review or enforcement action.
  • 7. Confidentiality, Security, and Integrity of Information  Notice and Other Individual Rights  Each covered entity, with certain exceptions, must provide a notice of its privacy practices and must contain certain elements:  Ways in which the entity may use and disclose PHI  The entity’s duties to protect privacy, provide a notice of privacy practices, and abide by the terms of the current notice.  Describes the individuals’ rights, including the right to complain to HHS and to the covered entity if they believe their privacy rights have been violated.  Must include a point of contact for further information and for making complaints to the covered entity.
  • 8. Confidentiality, Security, and Integrity of Information  Enforcement and Penalties for Noncompliance:  Termination of employment for violation of HIPPA policy.  Civil penalties to entity of $100 per failure to comply with a Privacy Rule requirement.  Individual fine of $50,000 and up to one year imprisonment.  The criminal penalties increase to $100,000 and up to five years imprisonment if the wrongful conduct involves false pretenses, and to $250,000 and up to ten years imprisonment if the wrongful conduct involves the intent to sell, transfer, or use individually identifiable health information for commercial advantage, personal gain, or malicious harm.
  • 9. Confidentiality, Security, and Integrity of Information  What is Your Role?  Ensure that patient information is not disclosed improperly but logging off computer terminals and keeping records within the appropriate setting.  Do not discuss through social media or in areas outside of the clinical area patient information.  Do not share information about patients with friends or family.  Discuss patient information only with those “covered entities” as outlined by the Privacy Rule.  Do not give your computer password to anyone.
  • 10. Confidentiality, Security, and Integrity of Information  References:  Summary of the HIPPA Privacy Rule, Office For Civil Rights; United States Department of Health and Human Resources 05/03, www.hhs.gov/ocr/privacy/hipaa/understanding/summary/ind; retrieved November 13, 2012.