Your SlideShare is downloading. ×
Confidentiality
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Saving this for later?

Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime - even offline.

Text the download link to your phone

Standard text messaging rates apply

Confidentiality

206
views

Published on

Ashford University online class MHA 690 week one discussion 2.

Ashford University online class MHA 690 week one discussion 2.


0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
206
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • Every patient is entitled to their privacy when it come to medical services. The use of the HIPPA laws is used to ensure that privacy. All hospitals and doctor offices hand these HIPPA privacy sheets to their patients letting them know that they are protected and that their information will not be given out. We have all heard about the doctor/patient confidentiality privileges. It safe guards patients and doctors from giving out information that might be incriminating if a patient should ever get into trouble with the law.
  • The statutes of HIPAA include rules protecting the privacy and the security of health data. These rules are enforced by the United States Department of Health and Human Services Office. (University of Information Technology Services, 2013) Title II of the HIPAA statutes states, “provides rules for controlling health care fraud and abuse, and includes an “Administrative Simplification” section that sets standards for enabling the electronic exchange of health information. (University of Information Technology Services, 2013) The Privacy Rule establishes a national standart to protect a persons individual medical record and other personal health information that applies to health plans, health care clearinghouses, and health care providers conduct health care transactions electronically.
  • According to Wolper (2011, p. 270) states, “Advancements in technology provide both increased opportunity and added responsibility for employers to monitor the activities of their employees.” FairWarning Inc. is the leading supplier in Patient Privacy Monitoring. In March of 2013 they released a new version of the software to help enhance privacy monitoring, regulatory reporting for the HIPAA Omnibus Rule risk assessment and notification requirements. (Business Wire, 2013)
  • The Health Information Technology for Economic and Clinical Health Act of 2009 was introduced to help “primarily on the new individual criminal liability component of the HITECH Act for breaches of patient privacy.” This should have been in place with the viewing of the celebrity patient files that were looked at in the article.
  • With all the technology that is out there and the information that is stored, patients should know their rights and know that they are protected in the event that personal information is obtained illegally or without permission. The only people that should be allowed to view patient information is doctors, billing, and those that are listed by the patient.
  • Transcript

    • 1. Cherlyn Griffin MHA 690: Health Care Capstone Sept. 26, 2013 Hwang-Ji Lu
    • 2. Right to Privacy  Patient has right to privacy  Use of HIPPA Laws  Doctor/Patient confidentiality applies
    • 3. HIPAA  HIPAA: Health Insurance Portability and Accountability.  Title II applies to patients  Privacy rules protects individual identifiable health information.
    • 4. Monitoring and Surveillance  Video Surveillance  Monitoring of electronic communication  Security clearance
    • 5. HITECH 2009  Health Information Technology for Economic and Clinical Health Act  Review of privacy and electronic security (e-security) polices and procedures  Strengthen safeguards for protecting health information, update business associate agreements  Develop risk assessment process, develop breach notification process for individuals
    • 6. Conclusion  Be aware of employee communication  Monitor electronic patient records  Know the Laws
    • 7. References  University of Information Technology Services. (2013). What is HIPAA>. Retrieved from http://kb.iu.edu/data/ayyy.html  Wolper, L.F. (2011). Health care administration: Managing organized delivery systems (5th ed.). Boston: Jones and Bartlett.  Business Wire. (2013). FairWarning(R) Announces FairWarning(R) Patient Privacy Monitoring Version 3.1.5. Retrieved from http://search.proquest.com/docview/13178793 12?accountid=32521
    • 8. References Cont.  Strauss, L.J (2012) Patient Privacy- Then and Now. Journal of Health Care Compliance, 14(3), 19-22, 61. Retrieved from http://search.proquest.com/docview/101 5279410?accountid=32521