SlideShare a Scribd company logo
1 of 8
Keep it Confidential


    Jacqui Marler-Schilling
          01/31/13
Who Should Access
        Confidential Patient
           Information
• Clinicians during the course of treating a patient
• The patient
• Hospital staff that utilizes information for billing and
  coding such as Health Information Management
• Designated persons by the patient that have signed
  necessary consent forms
Who Should NOT Access
    Confidential Patient
        Information
• Clinicians that are NOT involved in active patient
  care and treatment
• Staff that is NOT utilizing patient information for the
  purposes of treatment, billing, or coding.
• “Curious Staff” or persons
• Any member of the organization who cannot
  document, as needed, the reasons for accessing
  the record
How to Keep It Safe
• Put a footprint in the patient record showing who
  accessed the record and their relationship to the
  patient as part of the care team.
How to Keep it Safe


• Ensure that each user is educated on the importance
  of keeping their password in a safe place and not
  sharing with other employees. Have yearly training
  and re-education on the importance of privacy within
  your organization.
How to Keep it Safe
• Have a dedicated compliance and security officer
  in place within your organization. Policies and
  procedures should be in place regarding privacy
  that clearly outline the repercussions of security and
  privacy violations.
How to Keep it Safe
• Utilize patient aliases within the patient registration
  and electronic health record to ensure the privacy
  of famous or “well known” individuals.
How to Keep it Safe


• Shred documentation with patient information
  attached
• Utilize fax cover sheets when faxing or sending
  patient records
• Use general rule of thumb – don’t access ANY
  record without a valid reason for reviewing

More Related Content

What's hot

Confidentiality
ConfidentialityConfidentiality
Confidentialityamfields
 
Patient Confidentiality
Patient ConfidentialityPatient Confidentiality
Patient Confidentialitymarosemond
 
Healthcare Privacy and Confidentiality
Healthcare Privacy and ConfidentialityHealthcare Privacy and Confidentiality
Healthcare Privacy and Confidentialityjamaciald
 
Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentialityToni Meeks
 
Safran info sage & disruptive innovation
Safran  info sage & disruptive innovationSafran  info sage & disruptive innovation
Safran info sage & disruptive innovationTrimed Media Group
 
Employee confidentiality training
Employee confidentiality trainingEmployee confidentiality training
Employee confidentiality trainingJessi Morris
 
Patient Data De-identification and its Requirements
Patient Data De-identification and its RequirementsPatient Data De-identification and its Requirements
Patient Data De-identification and its RequirementsDicom Systems, Inc.
 
First eStandards conference Healthcare Executives Panel Dipak Kalra
First eStandards conference Healthcare Executives Panel Dipak KalraFirst eStandards conference Healthcare Executives Panel Dipak Kalra
First eStandards conference Healthcare Executives Panel Dipak Kalrachronaki
 
Maintain patient confidentiality.ppt mha690
Maintain patient confidentiality.ppt mha690Maintain patient confidentiality.ppt mha690
Maintain patient confidentiality.ppt mha690Josefina Calderon
 
Confidentiality training
Confidentiality trainingConfidentiality training
Confidentiality traininggissettepr
 
Patient Privacy Training
Patient Privacy TrainingPatient Privacy Training
Patient Privacy Trainingcarenanichole
 
Hippa compliance training
Hippa compliance trainingHippa compliance training
Hippa compliance trainingscapoccia
 
HIPAA and Confidentiality training
HIPAA and Confidentiality trainingHIPAA and Confidentiality training
HIPAA and Confidentiality trainingLaTanceiaGodfrey
 
When Telemedicine Does Deliver!: IT-Strategist, County Council of Uppsala
When Telemedicine Does Deliver!: IT-Strategist, County Council of UppsalaWhen Telemedicine Does Deliver!: IT-Strategist, County Council of Uppsala
When Telemedicine Does Deliver!: IT-Strategist, County Council of UppsalaPlan de Calidad para el SNS
 

What's hot (20)

Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Patient Confidentiality
Patient ConfidentialityPatient Confidentiality
Patient Confidentiality
 
Healthcare Privacy and Confidentiality
Healthcare Privacy and ConfidentialityHealthcare Privacy and Confidentiality
Healthcare Privacy and Confidentiality
 
Mha690 week 1 db 2
Mha690   week 1 db 2Mha690   week 1 db 2
Mha690 week 1 db 2
 
Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentiality
 
Safran info sage & disruptive innovation
Safran  info sage & disruptive innovationSafran  info sage & disruptive innovation
Safran info sage & disruptive innovation
 
Employee confidentiality training
Employee confidentiality trainingEmployee confidentiality training
Employee confidentiality training
 
MARESUME
MARESUMEMARESUME
MARESUME
 
Patient Data De-identification and its Requirements
Patient Data De-identification and its RequirementsPatient Data De-identification and its Requirements
Patient Data De-identification and its Requirements
 
First eStandards conference Healthcare Executives Panel Dipak Kalra
First eStandards conference Healthcare Executives Panel Dipak KalraFirst eStandards conference Healthcare Executives Panel Dipak Kalra
First eStandards conference Healthcare Executives Panel Dipak Kalra
 
Maintain patient confidentiality.ppt mha690
Maintain patient confidentiality.ppt mha690Maintain patient confidentiality.ppt mha690
Maintain patient confidentiality.ppt mha690
 
Confidentiality training
Confidentiality trainingConfidentiality training
Confidentiality training
 
Resume
ResumeResume
Resume
 
Patient Privacy Training
Patient Privacy TrainingPatient Privacy Training
Patient Privacy Training
 
Hippa compliance training
Hippa compliance trainingHippa compliance training
Hippa compliance training
 
HIPAA and Confidentiality training
HIPAA and Confidentiality trainingHIPAA and Confidentiality training
HIPAA and Confidentiality training
 
AnitaMosley 20141130
AnitaMosley 20141130AnitaMosley 20141130
AnitaMosley 20141130
 
Lecha Resume
Lecha ResumeLecha Resume
Lecha Resume
 
When Telemedicine Does Deliver!: IT-Strategist, County Council of Uppsala
When Telemedicine Does Deliver!: IT-Strategist, County Council of UppsalaWhen Telemedicine Does Deliver!: IT-Strategist, County Council of Uppsala
When Telemedicine Does Deliver!: IT-Strategist, County Council of Uppsala
 
PlasenciaRres
PlasenciaRresPlasenciaRres
PlasenciaRres
 

Viewers also liked

Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionIn a Rocket
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting PersonalKirsty Hulse
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanPost Planner
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldabaux singapore
 

Viewers also liked (7)

Keep it confidential v3
Keep it confidential v3Keep it confidential v3
Keep it confidential v3
 
Keep it confidential v2
Keep it confidential v2Keep it confidential v2
Keep it confidential v2
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming Convention
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting Personal
 
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job? Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media Plan
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
 

Similar to Keep Confidential Patient Information Secure

Week 1 discussion 2
Week 1 discussion 2Week 1 discussion 2
Week 1 discussion 2hbmaster
 
Week 1 discussion 2
Week 1 discussion 2Week 1 discussion 2
Week 1 discussion 2hbmaster
 
Week 1 discussion patient confidentiality
Week 1 discussion  patient confidentialityWeek 1 discussion  patient confidentiality
Week 1 discussion patient confidentialityapalaciosy
 
PURPOSES OF DOCUMENTATION.pptx
PURPOSES OF DOCUMENTATION.pptxPURPOSES OF DOCUMENTATION.pptx
PURPOSES OF DOCUMENTATION.pptxAnju Kumawat
 
Patient privacy wsanders
Patient privacy wsandersPatient privacy wsanders
Patient privacy wsandersmichellewand
 
Better understanding HIPPA and our responsibility as Providers: Avoidance Tec...
Better understanding HIPPA and our responsibility as Providers: Avoidance Tec...Better understanding HIPPA and our responsibility as Providers: Avoidance Tec...
Better understanding HIPPA and our responsibility as Providers: Avoidance Tec...cdmoore0206
 
Mha690 pp 7_oct19
Mha690 pp 7_oct19Mha690 pp 7_oct19
Mha690 pp 7_oct19jjatc76
 
Policies and procedure presentation
Policies and procedure presentation Policies and procedure presentation
Policies and procedure presentation rangada shah
 
Welcome to the hippa, privacy and security
Welcome to the hippa, privacy and securityWelcome to the hippa, privacy and security
Welcome to the hippa, privacy and securityveve1728
 
Marlene brooks week 1 discussion 2 - confidentiality
Marlene brooks   week 1 discussion 2 - confidentialityMarlene brooks   week 1 discussion 2 - confidentiality
Marlene brooks week 1 discussion 2 - confidentialitybablot33
 
Lecture 13 privacy, confidentiality and medical records
Lecture 13 privacy, confidentiality and medical recordsLecture 13 privacy, confidentiality and medical records
Lecture 13 privacy, confidentiality and medical recordsDr Ghaiath Hussein
 
medical proffessionalism
medical proffessionalismmedical proffessionalism
medical proffessionalismmitepajoseph
 
Mandatory hippa and information security
Mandatory hippa and information securityMandatory hippa and information security
Mandatory hippa and information securityHiggi123
 
Good medical practice 29 mac 2016
Good medical practice 29 mac 2016Good medical practice 29 mac 2016
Good medical practice 29 mac 2016Lee Oi Wah
 
Records and reports documtation 1st bsc ppt.pptx
Records and reports documtation 1st bsc  ppt.pptxRecords and reports documtation 1st bsc  ppt.pptx
Records and reports documtation 1st bsc ppt.pptxgj17092003
 
HIPAA and Privacy Training
HIPAA and Privacy TrainingHIPAA and Privacy Training
HIPAA and Privacy TrainingJasAmataga
 

Similar to Keep Confidential Patient Information Secure (20)

Week 1 discussion 2
Week 1 discussion 2Week 1 discussion 2
Week 1 discussion 2
 
Week 1 discussion 2
Week 1 discussion 2Week 1 discussion 2
Week 1 discussion 2
 
Understanding hipaa
Understanding hipaaUnderstanding hipaa
Understanding hipaa
 
Week 1 discussion patient confidentiality
Week 1 discussion  patient confidentialityWeek 1 discussion  patient confidentiality
Week 1 discussion patient confidentiality
 
PURPOSES OF DOCUMENTATION.pptx
PURPOSES OF DOCUMENTATION.pptxPURPOSES OF DOCUMENTATION.pptx
PURPOSES OF DOCUMENTATION.pptx
 
Patient privacy wsanders
Patient privacy wsandersPatient privacy wsanders
Patient privacy wsanders
 
Wk1d2
Wk1d2Wk1d2
Wk1d2
 
Better understanding HIPPA and our responsibility as Providers: Avoidance Tec...
Better understanding HIPPA and our responsibility as Providers: Avoidance Tec...Better understanding HIPPA and our responsibility as Providers: Avoidance Tec...
Better understanding HIPPA and our responsibility as Providers: Avoidance Tec...
 
Mha690 pp 7_oct19
Mha690 pp 7_oct19Mha690 pp 7_oct19
Mha690 pp 7_oct19
 
Policies and procedure presentation
Policies and procedure presentation Policies and procedure presentation
Policies and procedure presentation
 
Welcome to the hippa, privacy and security
Welcome to the hippa, privacy and securityWelcome to the hippa, privacy and security
Welcome to the hippa, privacy and security
 
Marlene brooks week 1 discussion 2 - confidentiality
Marlene brooks   week 1 discussion 2 - confidentialityMarlene brooks   week 1 discussion 2 - confidentiality
Marlene brooks week 1 discussion 2 - confidentiality
 
Hipaa-2015
Hipaa-2015Hipaa-2015
Hipaa-2015
 
Lecture 13 privacy, confidentiality and medical records
Lecture 13 privacy, confidentiality and medical recordsLecture 13 privacy, confidentiality and medical records
Lecture 13 privacy, confidentiality and medical records
 
medical proffessionalism
medical proffessionalismmedical proffessionalism
medical proffessionalism
 
BPSAC Purnia
BPSAC Purnia BPSAC Purnia
BPSAC Purnia
 
Mandatory hippa and information security
Mandatory hippa and information securityMandatory hippa and information security
Mandatory hippa and information security
 
Good medical practice 29 mac 2016
Good medical practice 29 mac 2016Good medical practice 29 mac 2016
Good medical practice 29 mac 2016
 
Records and reports documtation 1st bsc ppt.pptx
Records and reports documtation 1st bsc  ppt.pptxRecords and reports documtation 1st bsc  ppt.pptx
Records and reports documtation 1st bsc ppt.pptx
 
HIPAA and Privacy Training
HIPAA and Privacy TrainingHIPAA and Privacy Training
HIPAA and Privacy Training
 

Keep Confidential Patient Information Secure

  • 1. Keep it Confidential Jacqui Marler-Schilling 01/31/13
  • 2. Who Should Access Confidential Patient Information • Clinicians during the course of treating a patient • The patient • Hospital staff that utilizes information for billing and coding such as Health Information Management • Designated persons by the patient that have signed necessary consent forms
  • 3. Who Should NOT Access Confidential Patient Information • Clinicians that are NOT involved in active patient care and treatment • Staff that is NOT utilizing patient information for the purposes of treatment, billing, or coding. • “Curious Staff” or persons • Any member of the organization who cannot document, as needed, the reasons for accessing the record
  • 4. How to Keep It Safe • Put a footprint in the patient record showing who accessed the record and their relationship to the patient as part of the care team.
  • 5. How to Keep it Safe • Ensure that each user is educated on the importance of keeping their password in a safe place and not sharing with other employees. Have yearly training and re-education on the importance of privacy within your organization.
  • 6. How to Keep it Safe • Have a dedicated compliance and security officer in place within your organization. Policies and procedures should be in place regarding privacy that clearly outline the repercussions of security and privacy violations.
  • 7. How to Keep it Safe • Utilize patient aliases within the patient registration and electronic health record to ensure the privacy of famous or “well known” individuals.
  • 8. How to Keep it Safe • Shred documentation with patient information attached • Utilize fax cover sheets when faxing or sending patient records • Use general rule of thumb – don’t access ANY record without a valid reason for reviewing