SlideShare a Scribd company logo
1 of 10
Confidentiality
MHA690: Health Care Capstone
Ryan L. Ulibarri
9-26-2013
Report: Over 120 UCLA hospital staff saw celebrity health records (2008)
Introduction
Patient Confidentiality
Importance of Patient
Confidentiality
HIPAA
 Maintaining
Confidentiality
Display Actions
Conclusion
 In recent years, other
laws, especially the
Health Insurance
Portability and
Accountability Act
(HIPAA), have had
serious impact on the
administration of these
plans by, among other
things, implementing
privacy and related
requirements with
respect to personal
health information of
plan participants.
(Wolper 2011, p. 268)
Patient Confidentiality
 AMA's Code of Medical Ethics states that the information disclosed to a physician during the
course of the patient-physician relationship is confidential to the utmost degree.
 The legal basis for imposing liability for a breach of confidentiality is more extensive than
ethical guidelines, which dictate the morally right thing to do.
 This agreement allows the patient to feel free and easy no confidential medical information
will be disclosed or looked at without the patients express consent unless required to
disclose the information by law.
 A breach of confidentiality is a disclosure to a third party, without patient consent or court
order, of private information that the physician has learned within the patient-physician
relationship.
 Physicians should set up office procedures to prevent the release of medical records without
a copy of the patient's release.
 Do not release patients medical records to any 3rd parties in any case unless the patient has
the proper documents allowing to do that, this will can otherwise lead to breach of
confidentiality.
 Any breach in confidentiality—even one that seems minor—can result in mistrust and,
possibly, a lawsuit and/or disciplinary action.
Patient Confidentiality. (“n.d.”). Retrieved September 25, 2013, from http://www.ama-assn.org/ama/pub/physician-
resources/legal-topics/patient-physician-relationship-topics/patient-confidentiality.page
Importance of Confidentiality
Physicians have always had a duty to keep their
patients' medical records Confidential.
Physicians, Nurses, and office personal should
inform patients of the limits of confidentiality
protections and allow the patients to decide
whether treatment outweighs the risk of the
disclosure of sensitive information.
Protecting patients personal information needs to
be a mission to hospitals and all its staff to
provide the best patient experiences possible.
HIPAA
Health Insurance Portability and Accountability Act
Passed in 1996 by Congress
 The HIPAA Privacy regulations require health care providers and
organizations, as well as their business associates, develop and follow
procedures that ensure the confidentiality and security of protected
health information (PHI) when it is transferred, received, handled, or
shared.
 Mandates industry-wide standards for health care information on
electronic billing and other processes.
 Requires the protection and confidential handling of protected health
information.
 All personal who handles patient records of any kind need to be educated
on HIPPA compliances.
 HIPPA requirements are enforced by the Office for Civil Rights, an agency
within the US Department of Health and Human Services.
Health Insurance Portability and Accountability Act. (2013). Retrieved September 24, 2013, from
http://www.dhcs.ca.gov/formsandpubs/laws/hipaa/Pages/1.00%20WhatisHIPAA.aspx
Maintaining Confidentiality
Protection of Individually Identifiable Health Information (PHI)
 All information contained in patient medical and billing records is
confidential regardless of format; print, audio, electronic display or
storage.
 Hospitals need to inform patients of the current laws regarding Privacy
Practices.
 Violation of patient information and confidentiality standards, whether
intentional or unintentional, will be subject to disciplinary actions.
 All employees shall receive information and training concerning the
standards for Confidentiality of Patient Information and HIPAA in annual
mandatory education training.
 Healthcare organizations need to implement role-based access control
measures and processes for ensuring compliance measures within their
organizations to not allow medical records to be viewed by non authorized
personnel.
Maintaining Confidentiality
Continued
Safeguards
 Make sure you log off computer when leaving your area.
 Dispose paper in proper confidential bins to throw away.
 Position computer screens so patient information is not
visible to passerby
 Locate printers and fax machines in secure areas.
 Never take home patient information home unless it is
approved.
 Do not discuss a patients medical history to other
employees.
 A key thing to remember, patients need to feel confident
their medical records are confidential – ‘they trust you’.
Display Actions
 All personnel members need to trained on the Privacy and
Security Polices and Procedures to the level appropriate for
their job responsibilities and training must be documented.
 All new hires need to be provided training during their hiring
and orientation process.
 All employees need to sign a Confidentiality Agreement which
will be stored in their company Human Resource Department.
 All employees shall receive information and training
concerning the standards for Confidentiality of Patient
Information and HIPAA in annual mandatory education
training.
 All employees shall receive information and training
concerning the standards for Confidentiality of Patient
Information and HIPAA in annual mandatory education
training.
Conclusion
A breach of patient confidential information, whether
intentional or unintentional needs to be subject to
disciplinary actions. UCLA like so many health care
organizations have little real information on the number of
people within their organizations that have access to
electronic medical records, and even less information on
those who might have actually accessed those records.
This is a major problem and the case against UCLA
personnel in 2008 created organizations to implement
role-based access control measures and processes for
ensuring compliance to maintaining confidentiality of
patient information. As shared by Wolper (2011), “In
general, the Privacy Rule comprises five key principles: (1)
consumer control, (2) the setting of boundaries, (3)
accountability, (4) public responsibility, and (5) security’ (p.
390).
References
Health Insurance Portability and Accountability Act. (2013).
Retrieved September 24, 2013, from
http://www.dhcs.ca.gov/formsandpubs/laws/hipaa/Pages/1.00%
20WhatisHIPAA.aspx
Patient Confidentiality. (“n.d.”). Retrieved September 25, 2013,
from http://www.ama-assn.org/ama/pub/physician-
resources/legal-topics/patient-physician-relationship-
topics/patient-confidentiality.page
Wolper, L.F. (2011). Health care administration: Managing
organized delivery systems (5th ed.). Sudbury, MA: Jones and
Bartlett Publishers

More Related Content

What's hot

Marc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentationMarc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentationMarcEtienne6
 
TaylorWk1d2assignment
TaylorWk1d2assignmentTaylorWk1d2assignment
TaylorWk1d2assignmentmya1743
 
susanfullerMha690 week1discussion2pp
susanfullerMha690 week1discussion2ppsusanfullerMha690 week1discussion2pp
susanfullerMha690 week1discussion2ppPrayerful
 
Hippa privacy and security awareness
Hippa privacy and security awarenessHippa privacy and security awareness
Hippa privacy and security awarenessCharles Taft
 
Employee confidentiality training
Employee confidentiality trainingEmployee confidentiality training
Employee confidentiality trainingJessi Morris
 
Patient confidentiality seminar
Patient confidentiality seminarPatient confidentiality seminar
Patient confidentiality seminarLakisha M. Moore
 
Keys To HIPAA Compliance
Keys To HIPAA ComplianceKeys To HIPAA Compliance
Keys To HIPAA ComplianceCBIZ, Inc.
 
HIPAA 101- What all Doctors NEED to know
HIPAA 101- What all Doctors NEED to knowHIPAA 101- What all Doctors NEED to know
HIPAA 101- What all Doctors NEED to knowCompliancy Group
 
HIPAA Training: Preventing Employees from Violating HIPAA
HIPAA Training: Preventing Employees from Violating HIPAAHIPAA Training: Preventing Employees from Violating HIPAA
HIPAA Training: Preventing Employees from Violating HIPAAjbhicks
 
Health insurance portability and act(hipaa)2
Health insurance portability and act(hipaa)2Health insurance portability and act(hipaa)2
Health insurance portability and act(hipaa)29535814851
 
Leading your HIPAA Compliance Culture in 2016
Leading your HIPAA Compliance Culture in 2016Leading your HIPAA Compliance Culture in 2016
Leading your HIPAA Compliance Culture in 2016Lance King
 
Mha 690 wk1 d2 confidentiality
Mha 690 wk1 d2 confidentialityMha 690 wk1 d2 confidentiality
Mha 690 wk1 d2 confidentialitysolifen2
 
HIPPA-Health Insurance Portability and Accountability Act
HIPPA-Health Insurance Portability and Accountability ActHIPPA-Health Insurance Portability and Accountability Act
HIPPA-Health Insurance Portability and Accountability ActHarshit Trivedi
 

What's hot (18)

Marc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentationMarc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentation
 
TaylorWk1d2assignment
TaylorWk1d2assignmentTaylorWk1d2assignment
TaylorWk1d2assignment
 
susanfullerMha690 week1discussion2pp
susanfullerMha690 week1discussion2ppsusanfullerMha690 week1discussion2pp
susanfullerMha690 week1discussion2pp
 
Hippa training 2017
Hippa training 2017Hippa training 2017
Hippa training 2017
 
Hippa privacy and security awareness
Hippa privacy and security awarenessHippa privacy and security awareness
Hippa privacy and security awareness
 
Hipaa
HipaaHipaa
Hipaa
 
Employee confidentiality training
Employee confidentiality trainingEmployee confidentiality training
Employee confidentiality training
 
Patient confidentiality seminar
Patient confidentiality seminarPatient confidentiality seminar
Patient confidentiality seminar
 
Keys To HIPAA Compliance
Keys To HIPAA ComplianceKeys To HIPAA Compliance
Keys To HIPAA Compliance
 
Hipaa
HipaaHipaa
Hipaa
 
HIPAA Audio Presentation
HIPAA  Audio PresentationHIPAA  Audio Presentation
HIPAA Audio Presentation
 
HIPAA 101- What all Doctors NEED to know
HIPAA 101- What all Doctors NEED to knowHIPAA 101- What all Doctors NEED to know
HIPAA 101- What all Doctors NEED to know
 
HIPAA Training: Preventing Employees from Violating HIPAA
HIPAA Training: Preventing Employees from Violating HIPAAHIPAA Training: Preventing Employees from Violating HIPAA
HIPAA Training: Preventing Employees from Violating HIPAA
 
Health insurance portability and act(hipaa)2
Health insurance portability and act(hipaa)2Health insurance portability and act(hipaa)2
Health insurance portability and act(hipaa)2
 
HIPAA
HIPAAHIPAA
HIPAA
 
Leading your HIPAA Compliance Culture in 2016
Leading your HIPAA Compliance Culture in 2016Leading your HIPAA Compliance Culture in 2016
Leading your HIPAA Compliance Culture in 2016
 
Mha 690 wk1 d2 confidentiality
Mha 690 wk1 d2 confidentialityMha 690 wk1 d2 confidentiality
Mha 690 wk1 d2 confidentiality
 
HIPPA-Health Insurance Portability and Accountability Act
HIPPA-Health Insurance Portability and Accountability ActHIPPA-Health Insurance Portability and Accountability Act
HIPPA-Health Insurance Portability and Accountability Act
 

Viewers also liked

Patient Confidentiality
Patient ConfidentialityPatient Confidentiality
Patient ConfidentialityMike1fla
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013LeRoy Ulibarri
 
Week 1 discussion on confidentiality
Week 1 discussion on confidentialityWeek 1 discussion on confidentiality
Week 1 discussion on confidentialitytjefferson81
 
CONFIDENTIALITY Week 1 discussion 2 presentation mha 690
CONFIDENTIALITY Week 1 discussion 2 presentation mha 690CONFIDENTIALITY Week 1 discussion 2 presentation mha 690
CONFIDENTIALITY Week 1 discussion 2 presentation mha 690Ricardo Rios
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013LeRoy Ulibarri
 
9781111534127 ppt ch02
9781111534127 ppt ch029781111534127 ppt ch02
9781111534127 ppt ch02stanbridge
 
Jackson confidentiality mha690 health care capstone week 1 discussion 2 medic...
Jackson confidentiality mha690 health care capstone week 1 discussion 2 medic...Jackson confidentiality mha690 health care capstone week 1 discussion 2 medic...
Jackson confidentiality mha690 health care capstone week 1 discussion 2 medic...Rennessa Jackson
 

Viewers also liked (8)

Patient Confidentiality
Patient ConfidentialityPatient Confidentiality
Patient Confidentiality
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
Ageand sports
Ageand sportsAgeand sports
Ageand sports
 
Week 1 discussion on confidentiality
Week 1 discussion on confidentialityWeek 1 discussion on confidentiality
Week 1 discussion on confidentiality
 
CONFIDENTIALITY Week 1 discussion 2 presentation mha 690
CONFIDENTIALITY Week 1 discussion 2 presentation mha 690CONFIDENTIALITY Week 1 discussion 2 presentation mha 690
CONFIDENTIALITY Week 1 discussion 2 presentation mha 690
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
9781111534127 ppt ch02
9781111534127 ppt ch029781111534127 ppt ch02
9781111534127 ppt ch02
 
Jackson confidentiality mha690 health care capstone week 1 discussion 2 medic...
Jackson confidentiality mha690 health care capstone week 1 discussion 2 medic...Jackson confidentiality mha690 health care capstone week 1 discussion 2 medic...
Jackson confidentiality mha690 health care capstone week 1 discussion 2 medic...
 

Similar to Mha690 health care capstone - confidentiality 9-26-2013

The importance of confidentiality
The importance of confidentialityThe importance of confidentiality
The importance of confidentialityswilson0050
 
Confidentiality & privacy
Confidentiality & privacyConfidentiality & privacy
Confidentiality & privacykendale
 
Confidentiality & privacy
Confidentiality & privacyConfidentiality & privacy
Confidentiality & privacykendale
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippamaggie_Platt
 
MHA 690 week 2 discussin
MHA 690 week 2 discussinMHA 690 week 2 discussin
MHA 690 week 2 discussinBrooke A Thomas
 
Mha 690 week one discussion ii
Mha 690 week one discussion iiMha 690 week one discussion ii
Mha 690 week one discussion iibeleza1669
 
Protected health information
Protected health informationProtected health information
Protected health informationmiszkeeta
 
Healthcare Confidentiality
Healthcare ConfidentialityHealthcare Confidentiality
Healthcare Confidentialityljbroshious
 
Patient’s confidentiality
Patient’s confidentialityPatient’s confidentiality
Patient’s confidentialityDarkfawn
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA BasicsKarna *
 
health insurance portability and accountability act.pptx
health insurance portability and accountability act.pptxhealth insurance portability and accountability act.pptx
health insurance portability and accountability act.pptxamartya2087
 
Hippa final JU nursing informatics
Hippa final JU nursing informaticsHippa final JU nursing informatics
Hippa final JU nursing informaticskmcanty
 
Mha690 wk 1 fletcher
Mha690 wk 1   fletcherMha690 wk 1   fletcher
Mha690 wk 1 fletcherEmed32
 
HIPAA and RHIOs
HIPAA and RHIOsHIPAA and RHIOs
HIPAA and RHIOsnobumoto
 

Similar to Mha690 health care capstone - confidentiality 9-26-2013 (20)

The importance of confidentiality
The importance of confidentialityThe importance of confidentiality
The importance of confidentiality
 
Confidentiality & privacy
Confidentiality & privacyConfidentiality & privacy
Confidentiality & privacy
 
Confidentiality & privacy
Confidentiality & privacyConfidentiality & privacy
Confidentiality & privacy
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippa
 
MHA 690 week 2 discussin
MHA 690 week 2 discussinMHA 690 week 2 discussin
MHA 690 week 2 discussin
 
Mha 690 week one discussion ii
Mha 690 week one discussion iiMha 690 week one discussion ii
Mha 690 week one discussion ii
 
Protected health information
Protected health informationProtected health information
Protected health information
 
Healthcare Confidentiality
Healthcare ConfidentialityHealthcare Confidentiality
Healthcare Confidentiality
 
Patient’s confidentiality
Patient’s confidentialityPatient’s confidentiality
Patient’s confidentiality
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA Basics
 
DVHIMSS Ensuring Privacy and Security of HIEs in PA
DVHIMSS Ensuring Privacy and Security of HIEs in PADVHIMSS Ensuring Privacy and Security of HIEs in PA
DVHIMSS Ensuring Privacy and Security of HIEs in PA
 
health insurance portability and accountability act.pptx
health insurance portability and accountability act.pptxhealth insurance portability and accountability act.pptx
health insurance portability and accountability act.pptx
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Hipaa
HipaaHipaa
Hipaa
 
Hippa final JU nursing informatics
Hippa final JU nursing informaticsHippa final JU nursing informatics
Hippa final JU nursing informatics
 
HIPAA Presentation
HIPAA PresentationHIPAA Presentation
HIPAA Presentation
 
Mha690 wk 1 fletcher
Mha690 wk 1   fletcherMha690 wk 1   fletcher
Mha690 wk 1 fletcher
 
HIPAA and RHIOs
HIPAA and RHIOsHIPAA and RHIOs
HIPAA and RHIOs
 

Recently uploaded

How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 

Recently uploaded (20)

How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 

Mha690 health care capstone - confidentiality 9-26-2013

  • 1. Confidentiality MHA690: Health Care Capstone Ryan L. Ulibarri 9-26-2013 Report: Over 120 UCLA hospital staff saw celebrity health records (2008)
  • 2. Introduction Patient Confidentiality Importance of Patient Confidentiality HIPAA  Maintaining Confidentiality Display Actions Conclusion  In recent years, other laws, especially the Health Insurance Portability and Accountability Act (HIPAA), have had serious impact on the administration of these plans by, among other things, implementing privacy and related requirements with respect to personal health information of plan participants. (Wolper 2011, p. 268)
  • 3. Patient Confidentiality  AMA's Code of Medical Ethics states that the information disclosed to a physician during the course of the patient-physician relationship is confidential to the utmost degree.  The legal basis for imposing liability for a breach of confidentiality is more extensive than ethical guidelines, which dictate the morally right thing to do.  This agreement allows the patient to feel free and easy no confidential medical information will be disclosed or looked at without the patients express consent unless required to disclose the information by law.  A breach of confidentiality is a disclosure to a third party, without patient consent or court order, of private information that the physician has learned within the patient-physician relationship.  Physicians should set up office procedures to prevent the release of medical records without a copy of the patient's release.  Do not release patients medical records to any 3rd parties in any case unless the patient has the proper documents allowing to do that, this will can otherwise lead to breach of confidentiality.  Any breach in confidentiality—even one that seems minor—can result in mistrust and, possibly, a lawsuit and/or disciplinary action. Patient Confidentiality. (“n.d.”). Retrieved September 25, 2013, from http://www.ama-assn.org/ama/pub/physician- resources/legal-topics/patient-physician-relationship-topics/patient-confidentiality.page
  • 4. Importance of Confidentiality Physicians have always had a duty to keep their patients' medical records Confidential. Physicians, Nurses, and office personal should inform patients of the limits of confidentiality protections and allow the patients to decide whether treatment outweighs the risk of the disclosure of sensitive information. Protecting patients personal information needs to be a mission to hospitals and all its staff to provide the best patient experiences possible.
  • 5. HIPAA Health Insurance Portability and Accountability Act Passed in 1996 by Congress  The HIPAA Privacy regulations require health care providers and organizations, as well as their business associates, develop and follow procedures that ensure the confidentiality and security of protected health information (PHI) when it is transferred, received, handled, or shared.  Mandates industry-wide standards for health care information on electronic billing and other processes.  Requires the protection and confidential handling of protected health information.  All personal who handles patient records of any kind need to be educated on HIPPA compliances.  HIPPA requirements are enforced by the Office for Civil Rights, an agency within the US Department of Health and Human Services. Health Insurance Portability and Accountability Act. (2013). Retrieved September 24, 2013, from http://www.dhcs.ca.gov/formsandpubs/laws/hipaa/Pages/1.00%20WhatisHIPAA.aspx
  • 6. Maintaining Confidentiality Protection of Individually Identifiable Health Information (PHI)  All information contained in patient medical and billing records is confidential regardless of format; print, audio, electronic display or storage.  Hospitals need to inform patients of the current laws regarding Privacy Practices.  Violation of patient information and confidentiality standards, whether intentional or unintentional, will be subject to disciplinary actions.  All employees shall receive information and training concerning the standards for Confidentiality of Patient Information and HIPAA in annual mandatory education training.  Healthcare organizations need to implement role-based access control measures and processes for ensuring compliance measures within their organizations to not allow medical records to be viewed by non authorized personnel.
  • 7. Maintaining Confidentiality Continued Safeguards  Make sure you log off computer when leaving your area.  Dispose paper in proper confidential bins to throw away.  Position computer screens so patient information is not visible to passerby  Locate printers and fax machines in secure areas.  Never take home patient information home unless it is approved.  Do not discuss a patients medical history to other employees.  A key thing to remember, patients need to feel confident their medical records are confidential – ‘they trust you’.
  • 8. Display Actions  All personnel members need to trained on the Privacy and Security Polices and Procedures to the level appropriate for their job responsibilities and training must be documented.  All new hires need to be provided training during their hiring and orientation process.  All employees need to sign a Confidentiality Agreement which will be stored in their company Human Resource Department.  All employees shall receive information and training concerning the standards for Confidentiality of Patient Information and HIPAA in annual mandatory education training.  All employees shall receive information and training concerning the standards for Confidentiality of Patient Information and HIPAA in annual mandatory education training.
  • 9. Conclusion A breach of patient confidential information, whether intentional or unintentional needs to be subject to disciplinary actions. UCLA like so many health care organizations have little real information on the number of people within their organizations that have access to electronic medical records, and even less information on those who might have actually accessed those records. This is a major problem and the case against UCLA personnel in 2008 created organizations to implement role-based access control measures and processes for ensuring compliance to maintaining confidentiality of patient information. As shared by Wolper (2011), “In general, the Privacy Rule comprises five key principles: (1) consumer control, (2) the setting of boundaries, (3) accountability, (4) public responsibility, and (5) security’ (p. 390).
  • 10. References Health Insurance Portability and Accountability Act. (2013). Retrieved September 24, 2013, from http://www.dhcs.ca.gov/formsandpubs/laws/hipaa/Pages/1.00% 20WhatisHIPAA.aspx Patient Confidentiality. (“n.d.”). Retrieved September 25, 2013, from http://www.ama-assn.org/ama/pub/physician- resources/legal-topics/patient-physician-relationship- topics/patient-confidentiality.page Wolper, L.F. (2011). Health care administration: Managing organized delivery systems (5th ed.). Sudbury, MA: Jones and Bartlett Publishers

Editor's Notes

  1. Draft (only two rounds with one pick in each round per team) is the exclusive process for players to enter the league .Includes all emerging players, including international stars Drafted players who have exhausted their collegiate eligibility are reserved one year by the teams that drafted them .If a player sits out and enters the draft again, the player is reserved one year by the team that drafted him in this subsequent draft. If not drafted, a player is an unrestricted free agent.