• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Confidentiality
 

Confidentiality

on

  • 237 views

Ashford University online class MHA 690 week one discussion 2.

Ashford University online class MHA 690 week one discussion 2.

Statistics

Views

Total Views
237
Views on SlideShare
237
Embed Views
0

Actions

Likes
0
Downloads
2
Comments
0

0 Embeds 0

No embeds

Accessibility

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • Every patient is entitled to their privacy when it come to medical services. The use of the HIPPA laws is used to ensure that privacy. All hospitals and doctor offices hand these HIPPA privacy sheets to their patients letting them know that they are protected and that their information will not be given out. We have all heard about the doctor/patient confidentiality privileges. It safe guards patients and doctors from giving out information that might be incriminating if a patient should ever get into trouble with the law.
  • The statutes of HIPAA include rules protecting the privacy and the security of health data. These rules are enforced by the United States Department of Health and Human Services Office. (University of Information Technology Services, 2013) Title II of the HIPAA statutes states, “provides rules for controlling health care fraud and abuse, and includes an “Administrative Simplification” section that sets standards for enabling the electronic exchange of health information. (University of Information Technology Services, 2013) The Privacy Rule establishes a national standart to protect a persons individual medical record and other personal health information that applies to health plans, health care clearinghouses, and health care providers conduct health care transactions electronically.
  • According to Wolper (2011, p. 270) states, “Advancements in technology provide both increased opportunity and added responsibility for employers to monitor the activities of their employees.” FairWarning Inc. is the leading supplier in Patient Privacy Monitoring. In March of 2013 they released a new version of the software to help enhance privacy monitoring, regulatory reporting for the HIPAA Omnibus Rule risk assessment and notification requirements. (Business Wire, 2013)
  • The Health Information Technology for Economic and Clinical Health Act of 2009 was introduced to help “primarily on the new individual criminal liability component of the HITECH Act for breaches of patient privacy.” This should have been in place with the viewing of the celebrity patient files that were looked at in the article.
  • With all the technology that is out there and the information that is stored, patients should know their rights and know that they are protected in the event that personal information is obtained illegally or without permission. The only people that should be allowed to view patient information is doctors, billing, and those that are listed by the patient.

Confidentiality Confidentiality Presentation Transcript

  • Cherlyn Griffin MHA 690: Health Care Capstone Sept. 26, 2013 Hwang-Ji Lu
  • Right to Privacy  Patient has right to privacy  Use of HIPPA Laws  Doctor/Patient confidentiality applies
  • HIPAA  HIPAA: Health Insurance Portability and Accountability.  Title II applies to patients  Privacy rules protects individual identifiable health information.
  • Monitoring and Surveillance  Video Surveillance  Monitoring of electronic communication  Security clearance
  • HITECH 2009  Health Information Technology for Economic and Clinical Health Act  Review of privacy and electronic security (e-security) polices and procedures  Strengthen safeguards for protecting health information, update business associate agreements  Develop risk assessment process, develop breach notification process for individuals
  • Conclusion  Be aware of employee communication  Monitor electronic patient records  Know the Laws
  • References  University of Information Technology Services. (2013). What is HIPAA>. Retrieved from http://kb.iu.edu/data/ayyy.html  Wolper, L.F. (2011). Health care administration: Managing organized delivery systems (5th ed.). Boston: Jones and Bartlett.  Business Wire. (2013). FairWarning(R) Announces FairWarning(R) Patient Privacy Monitoring Version 3.1.5. Retrieved from http://search.proquest.com/docview/13178793 12?accountid=32521
  • References Cont.  Strauss, L.J (2012) Patient Privacy- Then and Now. Journal of Health Care Compliance, 14(3), 19-22, 61. Retrieved from http://search.proquest.com/docview/101 5279410?accountid=32521