SlideShare a Scribd company logo
1 of 10
Patient Health
Information
(PHI) must not
be improperly
disclosed.
Say no to
unauthorized
requests for
PHI.
Make sure
those passing
by don't see
PHI.
Patient Confidentiality 101
Health Insurance Portability and Accountability
Act (HIPAA) Basics
Why is Confidentiality Important?
Hospital’s Confidentiality Policy
What is a Breach of Confidentiality?
Audits and Monitoring Process
Reporting Violations
Disciplinary Actions
HIPAA Basics
 The Health Insurance Portability and Accountability Act (HIPAA) of
1996 (Public Law 104-191) was designed to protect the
privacy, confidentiality, and security of patient information.
 HIPAA standards are applicable to all health information in all of its
formats (e.g., electronic, paper, verbal). It applies to both electronically
maintained and transmitted information.
 HIPAA privacy standards include restrictions on access to individually
identifiable health information and the use and disclosure of that
information, as well as requirements for administrative activities such
as training, compliance, and enforcement of HIPAA mandates.
(Pozgar, 2012).
Why is confidentiality
important
 Confidentiality safeguards information that is gathered in the context of
an intimate relationship.
 It addresses the issue of how to keep information exchanged from being
disclosed to third parties.
 For example, confidentiality prevents physicians from disclosing
information shared with them by a patient in the course of a physician–
patient relationship.
 Any unauthorized or inadvertent disclosures of data gained as part of an
intimate relationship are breaches of confidentiality.
(Nass, Levit & Gostin, 2009).
 Adhere to hospital’s policies on confidentiality privacy, at all times.
 Access patient information only when information is required to
perform your work.
 Do not share or discuss patient information, unless it is necessary to
perform your work.
 Don’t ever share your identification number or password with anyone.
 Log off your computer session when you are not by your workstation.
 Ensure confidentiality when handling protected healthcare
information.
 All hospital employees will review the Privacy of Health Information
(PDF) Booklet located in the hospital’s portal; complete the quiz at
the end of booklet, and print certificate for inclusion in employee’s
personal record.
 All hospital employees will review, sign and return the Confidentiality
Form (PDF), located in the hospital portal.
Hospital’s Confidentiality poliCy
(Confidentiality and Privacy of Patient Information, n.d.).
 A breach of confidentiality occurs when a disclosure is
made to third party, without patient consent or court
order, of private patient information that the physician has
learned within the patient-physician relationship.
 Disclosures can be oral or written, by telephone or fax, or
electronically.
 For example, via e-mail or health information networks.
The medium is irrelevant, although special security
requirements may apply to the electronic transfer of
information.
What is a breach of
confidentiality?
Patient Confidentiality, (n.d.).
AUDITS & MONITORING process
 The hospital’s computer systems records all of your
system activities.
 The information you view and access using your account
leaves a digital trail of information, which includes where
you go and what you do.
 The system audits and monitors access to confidential
patient information on a regular basis; only access
information required to perform your job.
 All employees will be held accountable for unauthorized
access to confidential information.
(Protecting Patient Confidentiality and Security, 2011).
Reporting violations
 If you witness or suspect a confidentiality violation of a patient’s health
information, you must report it immediately to your supervisor.
 Other reporting means include:
 Hospital’s privacy office (email: vcsvs@hospital.edu or call 667-6726).
 Hospital’s Security office (email: lalks@hospital.edu or call 667-7363).
 Hospital’s Quality Assurance( email: qual@hospital.edu or call 667-
8272.
 You may also report violations anonymously, via the hospital’s Hotline,
 at 677-4444).
 REMEMBER: Reporting is everyone’s responsibility!
(Protecting Patient Confidentiality and Security, 2011).
Disciplinary actions
Unauthorized Access
equals
Termination of employment
References
Confidentiality and Privacy of Patient Information. (n.d.). Medical College of Wisconsin. Retrieved 2013, from
http://www.mcw.edu/GME/AR/ConfidentialityandPrivacyofPatientInformation.htm.
Patient Confidentiality. (n.d.). American Medical Association. Retrieved 2013, from http://www.ama-
assn.org//ama/pub/physician-resources/legal-topics/patient-physician-relationship-topics/patient-
confidentiality.page.
Pozgar, G. D. (2012). Legal aspects of health care administration (11th ed.). Sudbury, MA: Jones & Bartlett Learning.
Protecting Patient Confidentiality and Security. (2011). Upstate Medical University. Retrieved 2013, from
http://www.upstate.edu/forms/documents/F84037.pdf
Nass, S. J., Levit, L. A., & Gostin, L. O. (2009). Beyond the HIPAA Privacy Rule: Enhancing Privacy, Improving Health
Through Research. National Center for Biotechnology Information. Retrieved 2013, from
http://www.ncbi.nlm.nih.gov/books/NBK9579/.

More Related Content

What's hot

Privacy and confidentiality
Privacy and confidentialityPrivacy and confidentiality
Privacy and confidentialityjaredbrady
 
Confidentiality
ConfidentialityConfidentiality
Confidentialityblutoothe
 
Confidentiality
ConfidentialityConfidentiality
ConfidentialityRamiAboali
 
Patient Confidentiality
Patient ConfidentialityPatient Confidentiality
Patient Confidentialitymarosemond
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA BasicsKarna *
 
Confidentiality in the Workplace
Confidentiality in the WorkplaceConfidentiality in the Workplace
Confidentiality in the Workplacesalvarez63
 
Privacy & confedentiality
Privacy & confedentialityPrivacy & confedentiality
Privacy & confedentialityHemang Patel
 
Protecting patients confidentiality slide presentation
Protecting patients confidentiality slide presentationProtecting patients confidentiality slide presentation
Protecting patients confidentiality slide presentationplunkk
 
Lecture 13 privacy, confidentiality and medical records
Lecture 13 privacy, confidentiality and medical recordsLecture 13 privacy, confidentiality and medical records
Lecture 13 privacy, confidentiality and medical recordsDr Ghaiath Hussein
 
MODULE 8 - PRIVACY AND CONFIDENTIALITY
MODULE 8 - PRIVACY AND CONFIDENTIALITYMODULE 8 - PRIVACY AND CONFIDENTIALITY
MODULE 8 - PRIVACY AND CONFIDENTIALITYDr Ghaiath Hussein
 
The importance of confidentiality
The importance of confidentialityThe importance of confidentiality
The importance of confidentialityswilson0050
 
Confidentiality
Confidentiality Confidentiality
Confidentiality pcsamuels10
 
Ethics for Introduction to Health Care
Ethics for Introduction to Health CareEthics for Introduction to Health Care
Ethics for Introduction to Health CareRHSHealthScience
 
Patient Privacy and Safety in Healthcare
Patient Privacy and Safety in HealthcarePatient Privacy and Safety in Healthcare
Patient Privacy and Safety in HealthcareQueen Myers
 
The importance of confidentiality
The importance of confidentialityThe importance of confidentiality
The importance of confidentialityMOTHOM0556
 
SCHS Topic 5: Privacy, Confidentiality and Medical Records
SCHS Topic 5: Privacy, Confidentiality and Medical RecordsSCHS Topic 5: Privacy, Confidentiality and Medical Records
SCHS Topic 5: Privacy, Confidentiality and Medical RecordsDr Ghaiath Hussein
 
Healthcare Information Privacy & Confidentiality: How To Work Very Well With ...
Healthcare Information Privacy & Confidentiality: How To Work Very Well With ...Healthcare Information Privacy & Confidentiality: How To Work Very Well With ...
Healthcare Information Privacy & Confidentiality: How To Work Very Well With ...Nawanan Theera-Ampornpunt
 

What's hot (20)

Privacy and confidentiality
Privacy and confidentialityPrivacy and confidentiality
Privacy and confidentiality
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Patient Confidentiality
Patient ConfidentialityPatient Confidentiality
Patient Confidentiality
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA Basics
 
Confidentiality in the Workplace
Confidentiality in the WorkplaceConfidentiality in the Workplace
Confidentiality in the Workplace
 
Privacy & confedentiality
Privacy & confedentialityPrivacy & confedentiality
Privacy & confedentiality
 
Protecting patients confidentiality slide presentation
Protecting patients confidentiality slide presentationProtecting patients confidentiality slide presentation
Protecting patients confidentiality slide presentation
 
Lecture 13 privacy, confidentiality and medical records
Lecture 13 privacy, confidentiality and medical recordsLecture 13 privacy, confidentiality and medical records
Lecture 13 privacy, confidentiality and medical records
 
MODULE 8 - PRIVACY AND CONFIDENTIALITY
MODULE 8 - PRIVACY AND CONFIDENTIALITYMODULE 8 - PRIVACY AND CONFIDENTIALITY
MODULE 8 - PRIVACY AND CONFIDENTIALITY
 
The importance of confidentiality
The importance of confidentialityThe importance of confidentiality
The importance of confidentiality
 
Confidentiality
Confidentiality Confidentiality
Confidentiality
 
Ethics for Introduction to Health Care
Ethics for Introduction to Health CareEthics for Introduction to Health Care
Ethics for Introduction to Health Care
 
Patient Privacy and Safety in Healthcare
Patient Privacy and Safety in HealthcarePatient Privacy and Safety in Healthcare
Patient Privacy and Safety in Healthcare
 
The importance of confidentiality
The importance of confidentialityThe importance of confidentiality
The importance of confidentiality
 
SCHS Topic 5: Privacy, Confidentiality and Medical Records
SCHS Topic 5: Privacy, Confidentiality and Medical RecordsSCHS Topic 5: Privacy, Confidentiality and Medical Records
SCHS Topic 5: Privacy, Confidentiality and Medical Records
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Confidentiality
Confidentiality Confidentiality
Confidentiality
 
Healthcare Information Privacy & Confidentiality: How To Work Very Well With ...
Healthcare Information Privacy & Confidentiality: How To Work Very Well With ...Healthcare Information Privacy & Confidentiality: How To Work Very Well With ...
Healthcare Information Privacy & Confidentiality: How To Work Very Well With ...
 

Viewers also liked

Confidentially in the workplace
Confidentially in the workplaceConfidentially in the workplace
Confidentially in the workplaceKnighten
 
Employee confidentiality training
Employee confidentiality trainingEmployee confidentiality training
Employee confidentiality trainingJessi Morris
 
Workplace strategies for protecting confidential and proprietary property
Workplace strategies for protecting confidential and proprietary propertyWorkplace strategies for protecting confidential and proprietary property
Workplace strategies for protecting confidential and proprietary propertyNow Dentons
 
Emp Rights & Responsibility
Emp Rights & ResponsibilityEmp Rights & Responsibility
Emp Rights & Responsibilityeshontee09
 
susanfullerMha690 week1discussion2pp
susanfullerMha690 week1discussion2ppsusanfullerMha690 week1discussion2pp
susanfullerMha690 week1discussion2ppPrayerful
 
Safety Rules in the Workplace & Office
Safety Rules in the Workplace & OfficeSafety Rules in the Workplace & Office
Safety Rules in the Workplace & OfficeOxbridge Academy
 
Conflict Management Among Staff
Conflict Management Among StaffConflict Management Among Staff
Conflict Management Among StaffDarci Stanford
 

Viewers also liked (12)

Mha wk 1 dis 2
Mha wk 1 dis 2Mha wk 1 dis 2
Mha wk 1 dis 2
 
Hippa
HippaHippa
Hippa
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Confidentially in the workplace
Confidentially in the workplaceConfidentially in the workplace
Confidentially in the workplace
 
Employee confidentiality training
Employee confidentiality trainingEmployee confidentiality training
Employee confidentiality training
 
Workplace strategies for protecting confidential and proprietary property
Workplace strategies for protecting confidential and proprietary propertyWorkplace strategies for protecting confidential and proprietary property
Workplace strategies for protecting confidential and proprietary property
 
Emp Rights & Responsibility
Emp Rights & ResponsibilityEmp Rights & Responsibility
Emp Rights & Responsibility
 
susanfullerMha690 week1discussion2pp
susanfullerMha690 week1discussion2ppsusanfullerMha690 week1discussion2pp
susanfullerMha690 week1discussion2pp
 
Conflic resolution
Conflic resolution Conflic resolution
Conflic resolution
 
Safety Rules in the Workplace & Office
Safety Rules in the Workplace & OfficeSafety Rules in the Workplace & Office
Safety Rules in the Workplace & Office
 
Conflict Management Among Staff
Conflict Management Among StaffConflict Management Among Staff
Conflict Management Among Staff
 
Sexual Harassment in the Philippine Workplace
Sexual Harassment in the Philippine WorkplaceSexual Harassment in the Philippine Workplace
Sexual Harassment in the Philippine Workplace
 

Similar to Confidentiality

Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013LeRoy Ulibarri
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013LeRoy Ulibarri
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013LeRoy Ulibarri
 
MHA 690 week 2 discussin
MHA 690 week 2 discussinMHA 690 week 2 discussin
MHA 690 week 2 discussinBrooke A Thomas
 
Patient confidentiality 2
Patient confidentiality 2Patient confidentiality 2
Patient confidentiality 2Alice Felton
 
Confidentiality 9.26.13
Confidentiality 9.26.13Confidentiality 9.26.13
Confidentiality 9.26.13pneville0629
 
Hippa final JU nursing informatics
Hippa final JU nursing informaticsHippa final JU nursing informatics
Hippa final JU nursing informaticskmcanty
 
Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)bholmes
 
Discussion2
Discussion2 Discussion2
Discussion2 amberlinn
 
Week 1 dq1
Week 1 dq1Week 1 dq1
Week 1 dq1SNikki
 
Training manual point
Training manual pointTraining manual point
Training manual pointchdafe1253
 
Week 1 discussion 2
Week 1 discussion 2Week 1 discussion 2
Week 1 discussion 2girly12
 
Patient confidentiality MHA 690
Patient confidentiality MHA 690Patient confidentiality MHA 690
Patient confidentiality MHA 690AMSIMM9932
 
HIPAA INSERVICE 2017
HIPAA INSERVICE 2017 HIPAA INSERVICE 2017
HIPAA INSERVICE 2017 Meg Oser
 
Sylvia hipaa powerpoint presentation 2010(1)
Sylvia hipaa powerpoint presentation 2010(1)Sylvia hipaa powerpoint presentation 2010(1)
Sylvia hipaa powerpoint presentation 2010(1)bholmes
 
Training on confidentiality MHA690 Hayden
Training on confidentiality MHA690 HaydenTraining on confidentiality MHA690 Hayden
Training on confidentiality MHA690 Haydenhaydens
 
Upholding confidentiality
Upholding confidentialityUpholding confidentiality
Upholding confidentialityTheresa Tapley
 
MHA 690: Confidentiality
MHA 690: ConfidentialityMHA 690: Confidentiality
MHA 690: Confidentialityvpharoah
 
Ethical And Legal Aspects Of Health Care
Ethical And Legal Aspects Of Health CareEthical And Legal Aspects Of Health Care
Ethical And Legal Aspects Of Health CareLajpat Rai
 

Similar to Confidentiality (20)

Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
MHA 690 week 2 discussin
MHA 690 week 2 discussinMHA 690 week 2 discussin
MHA 690 week 2 discussin
 
Patient confidentiality 2
Patient confidentiality 2Patient confidentiality 2
Patient confidentiality 2
 
Confidentiality 9.26.13
Confidentiality 9.26.13Confidentiality 9.26.13
Confidentiality 9.26.13
 
Hippa final JU nursing informatics
Hippa final JU nursing informaticsHippa final JU nursing informatics
Hippa final JU nursing informatics
 
Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)
 
Discussion2
Discussion2 Discussion2
Discussion2
 
Week 1 dq1
Week 1 dq1Week 1 dq1
Week 1 dq1
 
Training manual point
Training manual pointTraining manual point
Training manual point
 
Week 1 discussion 2
Week 1 discussion 2Week 1 discussion 2
Week 1 discussion 2
 
Patient confidentiality MHA 690
Patient confidentiality MHA 690Patient confidentiality MHA 690
Patient confidentiality MHA 690
 
HIPAA INSERVICE 2017
HIPAA INSERVICE 2017 HIPAA INSERVICE 2017
HIPAA INSERVICE 2017
 
Sylvia hipaa powerpoint presentation 2010(1)
Sylvia hipaa powerpoint presentation 2010(1)Sylvia hipaa powerpoint presentation 2010(1)
Sylvia hipaa powerpoint presentation 2010(1)
 
Training on confidentiality MHA690 Hayden
Training on confidentiality MHA690 HaydenTraining on confidentiality MHA690 Hayden
Training on confidentiality MHA690 Hayden
 
Upholding confidentiality
Upholding confidentialityUpholding confidentiality
Upholding confidentiality
 
MHA 690: Confidentiality
MHA 690: ConfidentialityMHA 690: Confidentiality
MHA 690: Confidentiality
 
Confidentiality Training
Confidentiality Training Confidentiality Training
Confidentiality Training
 
Ethical And Legal Aspects Of Health Care
Ethical And Legal Aspects Of Health CareEthical And Legal Aspects Of Health Care
Ethical And Legal Aspects Of Health Care
 

Recently uploaded

Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxPoojaSen20
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 

Recently uploaded (20)

Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 

Confidentiality

  • 1. Patient Health Information (PHI) must not be improperly disclosed. Say no to unauthorized requests for PHI. Make sure those passing by don't see PHI.
  • 2. Patient Confidentiality 101 Health Insurance Portability and Accountability Act (HIPAA) Basics Why is Confidentiality Important? Hospital’s Confidentiality Policy What is a Breach of Confidentiality? Audits and Monitoring Process Reporting Violations Disciplinary Actions
  • 3. HIPAA Basics  The Health Insurance Portability and Accountability Act (HIPAA) of 1996 (Public Law 104-191) was designed to protect the privacy, confidentiality, and security of patient information.  HIPAA standards are applicable to all health information in all of its formats (e.g., electronic, paper, verbal). It applies to both electronically maintained and transmitted information.  HIPAA privacy standards include restrictions on access to individually identifiable health information and the use and disclosure of that information, as well as requirements for administrative activities such as training, compliance, and enforcement of HIPAA mandates. (Pozgar, 2012).
  • 4. Why is confidentiality important  Confidentiality safeguards information that is gathered in the context of an intimate relationship.  It addresses the issue of how to keep information exchanged from being disclosed to third parties.  For example, confidentiality prevents physicians from disclosing information shared with them by a patient in the course of a physician– patient relationship.  Any unauthorized or inadvertent disclosures of data gained as part of an intimate relationship are breaches of confidentiality. (Nass, Levit & Gostin, 2009).
  • 5.  Adhere to hospital’s policies on confidentiality privacy, at all times.  Access patient information only when information is required to perform your work.  Do not share or discuss patient information, unless it is necessary to perform your work.  Don’t ever share your identification number or password with anyone.  Log off your computer session when you are not by your workstation.  Ensure confidentiality when handling protected healthcare information.  All hospital employees will review the Privacy of Health Information (PDF) Booklet located in the hospital’s portal; complete the quiz at the end of booklet, and print certificate for inclusion in employee’s personal record.  All hospital employees will review, sign and return the Confidentiality Form (PDF), located in the hospital portal. Hospital’s Confidentiality poliCy (Confidentiality and Privacy of Patient Information, n.d.).
  • 6.  A breach of confidentiality occurs when a disclosure is made to third party, without patient consent or court order, of private patient information that the physician has learned within the patient-physician relationship.  Disclosures can be oral or written, by telephone or fax, or electronically.  For example, via e-mail or health information networks. The medium is irrelevant, although special security requirements may apply to the electronic transfer of information. What is a breach of confidentiality? Patient Confidentiality, (n.d.).
  • 7. AUDITS & MONITORING process  The hospital’s computer systems records all of your system activities.  The information you view and access using your account leaves a digital trail of information, which includes where you go and what you do.  The system audits and monitors access to confidential patient information on a regular basis; only access information required to perform your job.  All employees will be held accountable for unauthorized access to confidential information. (Protecting Patient Confidentiality and Security, 2011).
  • 8. Reporting violations  If you witness or suspect a confidentiality violation of a patient’s health information, you must report it immediately to your supervisor.  Other reporting means include:  Hospital’s privacy office (email: vcsvs@hospital.edu or call 667-6726).  Hospital’s Security office (email: lalks@hospital.edu or call 667-7363).  Hospital’s Quality Assurance( email: qual@hospital.edu or call 667- 8272.  You may also report violations anonymously, via the hospital’s Hotline,  at 677-4444).  REMEMBER: Reporting is everyone’s responsibility! (Protecting Patient Confidentiality and Security, 2011).
  • 10. References Confidentiality and Privacy of Patient Information. (n.d.). Medical College of Wisconsin. Retrieved 2013, from http://www.mcw.edu/GME/AR/ConfidentialityandPrivacyofPatientInformation.htm. Patient Confidentiality. (n.d.). American Medical Association. Retrieved 2013, from http://www.ama- assn.org//ama/pub/physician-resources/legal-topics/patient-physician-relationship-topics/patient- confidentiality.page. Pozgar, G. D. (2012). Legal aspects of health care administration (11th ed.). Sudbury, MA: Jones & Bartlett Learning. Protecting Patient Confidentiality and Security. (2011). Upstate Medical University. Retrieved 2013, from http://www.upstate.edu/forms/documents/F84037.pdf Nass, S. J., Levit, L. A., & Gostin, L. O. (2009). Beyond the HIPAA Privacy Rule: Enhancing Privacy, Improving Health Through Research. National Center for Biotechnology Information. Retrieved 2013, from http://www.ncbi.nlm.nih.gov/books/NBK9579/.