SlideShare a Scribd company logo
1 of 11
Patient Privacy & Confidentiality
By: Kelly Larson
MHA 690
CONFIDENTIALITY

There are multiple
ways in which
healthcare
organizations can
reduce the risk of
confidentiality
breaching in the
workplace.
Healthcare Personnel
• Healthcare personnel who handle sensitive and
confidential patient information should be
trained and aware of the policies and
procedures governing the protection of this
information.
• Learning management system software can
help train your staff on security privacy policies
that would be helpful in reducing potential
breaches in confidentiality.
• Employees must understand the importance of
protecting patient data and healthcare
organizations must effectively train and enforce
confidentiality policies and procedures (Pennic,
2012).
Implementation
• “Healthcare organizations should implement
security and privacy measures such as AES-NI
(Advanced Encryption Standards New
Instructions) protecting the confidentiality of
sensitive data” (Pennic, 2012, para. 7).
• Encryption must be properly implemented in a
multilayered approach with administrative and
physical controls.
*This type of security system may be costly to the
organization, but is crucial for the protection and
confidentiality of its patients.*
Web 2.0 Tools…
• Healthcare organizations that use healthcare
security and privacy best practices can greatly
reduce the occurrence of confidentiality
breaches within their healthcare
organizations.
• In this day in age there are a variety of web
2.0 tools that are available for nursing staff….
For Instance:
• Some of them include:
–Blogs
–Podcasts
–Social media networks (Facebook,
Twitter, YouTube)
–Videocasts
Tools Cont…
• It is a good way to inform a large group of
people regarding patient confidentiality.
• Web 2.0 technologies makes training on
confidentiality more accessible to nurses.
• Blogs and other social networking tools may
be used to enhance the educational method
and to increase effectiveness.
Web 2.0 Example: Mediagram
A messaging system for medical professionals
• “Medigram strives to provide a secure, HIPAA
compliant group messaging system for
medical professionals” (“Medigram”, 2013,
para. 1).
– This type of massaging fits into the change of the
technological times. Using these types of systems
stresses the importance of confidentiality in the
workplace.
– Communication can be enabled in an encrypted
way to enforce the laws of HIPAA.
Benefits
• The increased communications among
colleagues and nursing staff will enable
advanced health and can be a platform for
future organizations.
• Using the technology of today makes the
training and retention a lot more valuable.
• Training can be used over many years an
across many fields in healthcare.
Repercussions
• All employees should be readily aware of the
repercussions of not following the
organizations ethics code of conduct.
• Protection for the organization and the
patients within is essential, significant and
sensitive!
References
Medigram. (2013). Retrieved from:
http://www.go2web20.net/app/?a=medigram
Pennic, F. (2013). 5 ways healthcare
organizations can reduce security breaches.
Retrieved
from:http://getreferralmd.com/2012/10/5ways-healthcare-organizations-can-reducesecurity-breaches/

More Related Content

Viewers also liked

nursing - communication
nursing - communicationnursing - communication
nursing - communicationtwiggypiggy
 
Legal & ethical aspects in mental health nursing
Legal & ethical aspects in mental health nursingLegal & ethical aspects in mental health nursing
Legal & ethical aspects in mental health nursingNursing Path
 
Theraeutic nurse patient relationship
Theraeutic nurse patient relationshipTheraeutic nurse patient relationship
Theraeutic nurse patient relationshipNursing Path
 
Therapeutic communication techniques
Therapeutic communication techniquesTherapeutic communication techniques
Therapeutic communication techniquesKaren Greenberg
 
Communication in nursing
Communication in nursingCommunication in nursing
Communication in nursingNursing Path
 
Code of ethics ppt
Code of ethics pptCode of ethics ppt
Code of ethics pptaneez103
 

Viewers also liked (6)

nursing - communication
nursing - communicationnursing - communication
nursing - communication
 
Legal & ethical aspects in mental health nursing
Legal & ethical aspects in mental health nursingLegal & ethical aspects in mental health nursing
Legal & ethical aspects in mental health nursing
 
Theraeutic nurse patient relationship
Theraeutic nurse patient relationshipTheraeutic nurse patient relationship
Theraeutic nurse patient relationship
 
Therapeutic communication techniques
Therapeutic communication techniquesTherapeutic communication techniques
Therapeutic communication techniques
 
Communication in nursing
Communication in nursingCommunication in nursing
Communication in nursing
 
Code of ethics ppt
Code of ethics pptCode of ethics ppt
Code of ethics ppt
 

Recently uploaded

Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 

Recently uploaded (20)

Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 

Patient privacy & confidentiality

  • 1. Patient Privacy & Confidentiality By: Kelly Larson MHA 690
  • 2. CONFIDENTIALITY There are multiple ways in which healthcare organizations can reduce the risk of confidentiality breaching in the workplace.
  • 3. Healthcare Personnel • Healthcare personnel who handle sensitive and confidential patient information should be trained and aware of the policies and procedures governing the protection of this information. • Learning management system software can help train your staff on security privacy policies that would be helpful in reducing potential breaches in confidentiality. • Employees must understand the importance of protecting patient data and healthcare organizations must effectively train and enforce confidentiality policies and procedures (Pennic, 2012).
  • 4. Implementation • “Healthcare organizations should implement security and privacy measures such as AES-NI (Advanced Encryption Standards New Instructions) protecting the confidentiality of sensitive data” (Pennic, 2012, para. 7). • Encryption must be properly implemented in a multilayered approach with administrative and physical controls. *This type of security system may be costly to the organization, but is crucial for the protection and confidentiality of its patients.*
  • 5. Web 2.0 Tools… • Healthcare organizations that use healthcare security and privacy best practices can greatly reduce the occurrence of confidentiality breaches within their healthcare organizations. • In this day in age there are a variety of web 2.0 tools that are available for nursing staff….
  • 6. For Instance: • Some of them include: –Blogs –Podcasts –Social media networks (Facebook, Twitter, YouTube) –Videocasts
  • 7. Tools Cont… • It is a good way to inform a large group of people regarding patient confidentiality. • Web 2.0 technologies makes training on confidentiality more accessible to nurses. • Blogs and other social networking tools may be used to enhance the educational method and to increase effectiveness.
  • 8. Web 2.0 Example: Mediagram A messaging system for medical professionals • “Medigram strives to provide a secure, HIPAA compliant group messaging system for medical professionals” (“Medigram”, 2013, para. 1). – This type of massaging fits into the change of the technological times. Using these types of systems stresses the importance of confidentiality in the workplace. – Communication can be enabled in an encrypted way to enforce the laws of HIPAA.
  • 9. Benefits • The increased communications among colleagues and nursing staff will enable advanced health and can be a platform for future organizations. • Using the technology of today makes the training and retention a lot more valuable. • Training can be used over many years an across many fields in healthcare.
  • 10. Repercussions • All employees should be readily aware of the repercussions of not following the organizations ethics code of conduct. • Protection for the organization and the patients within is essential, significant and sensitive!
  • 11. References Medigram. (2013). Retrieved from: http://www.go2web20.net/app/?a=medigram Pennic, F. (2013). 5 ways healthcare organizations can reduce security breaches. Retrieved from:http://getreferralmd.com/2012/10/5ways-healthcare-organizations-can-reducesecurity-breaches/