Your SlideShare is downloading. ×
Confidentiality Training
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Introducing the official SlideShare app

Stunning, full-screen experience for iPhone and Android

Text the download link to your phone

Standard text messaging rates apply

Confidentiality Training

479
views

Published on

Week 1 …

Week 1
Confidentiality

Published in: Education, Business, Technology

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
479
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
7
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. CONFIDENTIALITY & SECURITY TRAINING
    Linda Walter
    MHA 690
    Instructor - Dr. Jeanette Peck
    June 9, 2011
  • 2. Introduction
    • HIPAA Definition
    • 3. HIPAA Privacy Rule Overview
    • 4. What is Protected Health Information (PHI)
    • 5. HIPAA Security Rule Overview
    • 6. Who is Required to Train?
    • 7. How Often is Training Required?
  • Health Insurance Portability and Accountability Act (HIPAA)
    In 1996, Congress passed the HIPAA Public Law 104-191. HIPAA required Health and Human Services (HHS) to establish – with far-reaching implications and consequences – new guidelines, key principles, and national standards for the handling of electronic healthcare, applicable to everyone working within the US healthcare system (Wolper, 2011, p. 389).
  • 8. HIPAA Privacy Overview
    • Intended to protect the privacy of all individually identifiable health information created or held by covered entities, regardless of whether it is or ever has been in electronic form.
    • 9. Includes paper records and oral communications.
    • 10. Must maintain documentation of their policies and procedures for complying with the standards,
    • 11. Must include a statement of who has access to protected health information, how it is used within the covered entity, and when it would or would not be disclosed to other entities.
    • 12. Providers must obtain a patient's consent for the disclosure or use of the patient's health information, even for treatment, payment, and health care operations purposes.
  • What is Protected Health Information (PHI) ?
    Protected Health information is any information about a patients health status, the patients care, or any patient information about payments of his care. PHI is any information about the patient.
  • 13. HIPAA Security Rule Overview
    • Final component of HIPAA
    • 14. Deals with protection of identifiable health information
    • 15. Inadvertent disclosure of identifiable health information
    • 16. Deliberate misuse of identifiable health information
    • 17. Established standards and regulations for healthcare providers on required procedures ensuring administrative safeguards
    • 18. There are different levels of penalties for violations
  • Who is Required to Train?
    All employees at all levels
  • 19. How Often is Training required?
    • Training is required at date of hire
    • 20. Training is required yearly
    • 21. Training will be completed on the internet computerized training education site
  • REFERENCES
    • Tan, J. and Payton, F. (2010). Adaptive health management information systems: concepts, cases, and practical applications (3rd ed.). Sudbury, Massachusetts. Jones and Bartlett Publishers.
    • 22. U.S. Department of Health and Human Services . Retrieved June 9, 2011 from http://www.ihs.gov/AdminMngrResources/HIPAA/index.cfm?module=privacy_standards.
    • 23. Wolper, L. (2011). Health care administration managing organized delivery systems (Fifth Edition). Sudbury, Massachusetts, Jones and Bartlett Publishers.