Protecting Privacy &         Confidentiality                                                  Kyle Fortune                ...
 UCLA    Hospital  › Staff breached privacy and confidentiality of    numerous celebrities  › One employee saw over 900 p...
 What   is HIPPA?  › Health Insurance Portability and    Accountability Act (HIPAA)  › Public Law passed in 1996     Set...
 Seven Regulatory Steps Healthcare Services Must Follow:  › Access Control  › Encryption of Private Health Data  › Integr...
 Access   Control  › Protects against inappropriate retrieval of    electronic health information  › Passwords are requir...
 Encryption    of Private Health Data  › Prevents intruders from accessing records  › Makes it difficult to recode health...
 Authentication  › Required to access EMR  › Identifies who is accessing the EMR Audit   Control  › Traces who has acces...
 Alarms  › Provide warnings and alerts for attempted    intrusion  › Audits and alarms go hand-in-hand to see    who may ...
 Event   Reporting  › Standards and regulations must be followed    at all times  › ALL breaches of HIPAA must be reporte...
 Access   Control & Authentication  › Never share your password with anyone      People can use your password to access ...
 Report   events/violations  › Patients have the right to know about    unauthorized access  › Intentional breaches are i...
Unauthorized access is illegal!  Violation can lead to termination!        Even worse….criminal charges!                  ...
Over 120 UCLA hospital staff saw celebrity health records. (2008).  Retrieved from http://www.foxnews.com/story/0,2933,398...
Upcoming SlideShare
Loading in...5
×

Mha 690 -week one--confidentiality power point

291

Published on

Published in: Business, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
291
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
3
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Mha 690 -week one--confidentiality power point

  1. 1. Protecting Privacy & Confidentiality Kyle Fortune MHA 690 Dr. Ray Borges April 25, 2012Slide Backgrounds from: http://www.dvd-ppt-slideshow.com
  2. 2.  UCLA Hospital › Staff breached privacy and confidentiality of numerous celebrities › One employee saw over 900 patient records without consent  Staff faces federal criminal charges  Staff were warned, suspended, and/or fired (Over 120 UCLA Hospital Staff Saw Celebrity Health Records, 2008)
  3. 3.  What is HIPPA? › Health Insurance Portability and Accountability Act (HIPAA) › Public Law passed in 1996  Set new guidelines for handling electronic healthcare transactions  Applicable to everyone working in the United States Healthcare System  Ensures protection of medical records (Wolper, 2011)
  4. 4.  Seven Regulatory Steps Healthcare Services Must Follow: › Access Control › Encryption of Private Health Data › Integrity Control › Authentication › Audit Control › Alarms › Event Reporting (Wolper, 2011)
  5. 5.  Access Control › Protects against inappropriate retrieval of electronic health information › Passwords are required to gain access to electronic medical records (EMR) › NEVER ACCESS A PATIENT’S RECORD UNLESS IT IS A NECESSITY! (Wolper, 2011)
  6. 6.  Encryption of Private Health Data › Prevents intruders from accessing records › Makes it difficult to recode health information if wrongfully accessed Integrity Control › Protects validity of accessible data › Protects reliability of accessible data (Wolper, 2011)
  7. 7.  Authentication › Required to access EMR › Identifies who is accessing the EMR Audit Control › Traces who has accessed EMR › Helps identify inappropriate access (Wolper, 2011)
  8. 8.  Alarms › Provide warnings and alerts for attempted intrusion › Audits and alarms go hand-in-hand to see who may be frequently accessing EMR  Authentication is important to prevent warnings/alerts from occurring  Improper access will result in a warning/alert for breach of privacy (Wolper, 2011)
  9. 9.  Event Reporting › Standards and regulations must be followed at all times › ALL breaches of HIPAA must be reported swiftly to…  Prevent damages  Regain control of access  Inform patients who have been impacted by the breach of HIPAA (Wolper, 2011)
  10. 10.  Access Control & Authentication › Never share your password with anyone  People can use your password to access records  This will result in a breach of privacy if improperly used › Never leave a computer with EMR open
  11. 11.  Report events/violations › Patients have the right to know about unauthorized access › Intentional breaches are illegal  May lead to criminal investigation and criminal charges › Staff who intentionally breach privacy will be suspended and/or terminated
  12. 12. Unauthorized access is illegal! Violation can lead to termination! Even worse….criminal charges! NEVER TAKE THE RISK!
  13. 13. Over 120 UCLA hospital staff saw celebrity health records. (2008). Retrieved from http://www.foxnews.com/story/0,2933,398784,00.htmlWolper, L. (2011). Health care administration (5th ed.). Sudbury, MA: Jones and Bartlett.
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×