SlideShare a Scribd company logo
1 of 3
The Office for Civil Rights enforces the HIPAA Privacy Rule, which protects the
privacy of individually identifiable health information; the HIPAA Security Rule,
which sets national standards for the security of electronic protected health
information; the HIPAA Breach Notification Rule, which requires covered entities
and business associates to provide notification following a breach of unsecured
protected health information; and the confidentiality provisions of the Patient
Safety Rule, which protect identifiable information being used to analyze patient
safety events and improve patient safety (United, 2013).
What is the Health Insurance Portability and Accountability Act?
The Health Insurance Portability and Accountability Act (HIPAA) of 1996 is set of
statutes designed to improve the efficiency and effectiveness of the US health care
system:
• Title I: Title I of HIPAA provides rules to "improve the portability and
continuity of health insurance coverage" for workers when they change employers.
• Title II: Title II of HIPAA provides rules for controlling health care fraud and
abuse, and includes an "Administrative Simplification" section that sets standards
for enabling the electronic exchange of health information (University, 2013).
What does HIPPA do?
Places limits on how confidential health information can be shared with others.
Establishes patient rights to control the sharing of their health information.
Puts safeguards in place for confidential health information collected, maintained,
used, or transmitted in electronic form
What is privacy?
Refers to WHAT is protected — information about an individual and the
determination of WHO is permitted to use, disclose, or access the information
What is security?
Refers to HOW information is safeguarded—ensuring privacy by controlling
access to information and protecting it from inappropriate disclosure and
accidental or intentional destruction or loss (Upstate, 2011).
Patients expect privacy when they are receiving healthcare. Patients also expect
that their confidential health information will be appropriately protected.
Examples of safeguards that help to ensure confidentiality are:
Shred all paper containing confidential health information or place in closed
receptacles
When faxing, verify the fax number before sending
Close doors or privacy curtains when having discussions ofconfidential health
information
Do not leave medical records unattended or in open areas
Respect the privacy rights of employees who come here for care by affording their
information the utmost confidentiality it deserves
Keep confidential health information you hear or see to yourself
Examples of computer safeguards to secure our information include:
Protect your access by not sharing your account and/or password with others
Do not write down or post your password on computer systems
Never leaving a workstation signed on or left unattended with access to
confidential health information
Access information in computer systems when you have a need to- know the
information
Never disable or remove the virus detection software
Take measures to protect your computer passwords so that they are not misused.
Patients trust that when they share their confidential health information with
healthcare staff, it will be afforded the appropriate privacy and security protections
User education concerning virus protection
User education in importance of monitoring login success/failure, and how to
report discrepancies
User education in password management
Education on awareness
Reference
Sheidy, D.P. & McMahon, M.K. (2002). Hippa and training: Web based strategies
for compliance. Retrieved September 26, 2013, from
http://www.ehcca.com/presentations/HIPAA/sheidy-tue.pdf
United States Department of Health and Human Services. (2013). Health
information privacy. Retrieved September 26, 2013, from
http://www.hhs.gov/ocr/privacy/index.html
Upstate Medical Center. (2011). Protecting patient confidentiality and security.
Retrieved September 26, 2013, from
http://www.upstate.edu/forms/documents/F84037.pdf
University Information Technology Services. (2013). What is HIPPA?. Retrieved
September 26, 2013, from http://kb.iu.edu/data/ayyy.html

More Related Content

What's hot

Patient confidentiality training
Patient confidentiality trainingPatient confidentiality training
Patient confidentiality training
Sheena705
 
Patient confidentiality 2
Patient confidentiality 2Patient confidentiality 2
Patient confidentiality 2
Alice Felton
 
Introduction hippaa
Introduction hippaaIntroduction hippaa
Introduction hippaa
Tina Peña
 
Employee confidentiality training
Employee confidentiality trainingEmployee confidentiality training
Employee confidentiality training
Jessi Morris
 
Shontea shepard hippa training
Shontea shepard hippa trainingShontea shepard hippa training
Shontea shepard hippa training
sshontea
 
Week 1 dq1
Week 1 dq1Week 1 dq1
Week 1 dq1
SNikki
 
Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)
bholmes
 

What's hot (19)

Patient confidentiality training
Patient confidentiality trainingPatient confidentiality training
Patient confidentiality training
 
Patient confidentiality 2
Patient confidentiality 2Patient confidentiality 2
Patient confidentiality 2
 
Introduction hippaa
Introduction hippaaIntroduction hippaa
Introduction hippaa
 
Employee confidentiality training
Employee confidentiality trainingEmployee confidentiality training
Employee confidentiality training
 
Shontea shepard hippa training
Shontea shepard hippa trainingShontea shepard hippa training
Shontea shepard hippa training
 
Hipaa
HipaaHipaa
Hipaa
 
Mha690 disc 2 week 1
Mha690 disc 2 week 1Mha690 disc 2 week 1
Mha690 disc 2 week 1
 
Mha690 w1 d2
Mha690 w1 d2Mha690 w1 d2
Mha690 w1 d2
 
HIPAA Compliance Checklist
HIPAA Compliance ChecklistHIPAA Compliance Checklist
HIPAA Compliance Checklist
 
Welcome to the hippa, privacy and security
Welcome to the hippa, privacy and securityWelcome to the hippa, privacy and security
Welcome to the hippa, privacy and security
 
Patient privacy 2.0 slides
Patient privacy 2.0 slidesPatient privacy 2.0 slides
Patient privacy 2.0 slides
 
Week 1 dq1
Week 1 dq1Week 1 dq1
Week 1 dq1
 
Confidentiality Training
Confidentiality TrainingConfidentiality Training
Confidentiality Training
 
Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)
 
HIPAA Compliance
HIPAA Compliance HIPAA Compliance
HIPAA Compliance
 
Hippa training 2017
Hippa training 2017Hippa training 2017
Hippa training 2017
 
HIPAA Complaince
HIPAA ComplainceHIPAA Complaince
HIPAA Complaince
 
Patient confidentiality seminar
Patient confidentiality seminarPatient confidentiality seminar
Patient confidentiality seminar
 
Hipaa slideshow
Hipaa slideshowHipaa slideshow
Hipaa slideshow
 

Similar to Confidentiality 9.26.13

Patient confidentiality 9.26.13
Patient confidentiality 9.26.13Patient confidentiality 9.26.13
Patient confidentiality 9.26.13
pneville0629
 
Training on confidentiality MHA690 Hayden
Training on confidentiality MHA690 HaydenTraining on confidentiality MHA690 Hayden
Training on confidentiality MHA690 Hayden
haydens
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
LeRoy Ulibarri
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
LeRoy Ulibarri
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA Basics
Karna *
 
Describe one safeguard that should be in place to protect the confid.pdf
Describe one safeguard that should be in place to protect the confid.pdfDescribe one safeguard that should be in place to protect the confid.pdf
Describe one safeguard that should be in place to protect the confid.pdf
mohammedfootwear
 
Mha690 wk 1 fletcher
Mha690 wk 1   fletcherMha690 wk 1   fletcher
Mha690 wk 1 fletcher
Emed32
 
Sylvia hipaa powerpoint presentation 2010(1)
Sylvia hipaa powerpoint presentation 2010(1)Sylvia hipaa powerpoint presentation 2010(1)
Sylvia hipaa powerpoint presentation 2010(1)
bholmes
 
HIPAA , REGULATORY AFFAIRS , M.PHARM ...
HIPAA , REGULATORY AFFAIRS , M.PHARM ...HIPAA , REGULATORY AFFAIRS , M.PHARM ...
HIPAA , REGULATORY AFFAIRS , M.PHARM ...
susmitaghosh93
 

Similar to Confidentiality 9.26.13 (20)

Patient confidentiality 9.26.13
Patient confidentiality 9.26.13Patient confidentiality 9.26.13
Patient confidentiality 9.26.13
 
Training on confidentiality MHA690 Hayden
Training on confidentiality MHA690 HaydenTraining on confidentiality MHA690 Hayden
Training on confidentiality MHA690 Hayden
 
HIPAA Compliance For Small Practices
HIPAA Compliance For Small PracticesHIPAA Compliance For Small Practices
HIPAA Compliance For Small Practices
 
Discussion2
Discussion2 Discussion2
Discussion2
 
Health Insurance and Portability and Accountability Act
Health Insurance and Portability and Accountability ActHealth Insurance and Portability and Accountability Act
Health Insurance and Portability and Accountability Act
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
Marc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentationMarc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentation
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA Basics
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
health insurance portability and accountability act.pptx
health insurance portability and accountability act.pptxhealth insurance portability and accountability act.pptx
health insurance portability and accountability act.pptx
 
Describe one safeguard that should be in place to protect the confid.pdf
Describe one safeguard that should be in place to protect the confid.pdfDescribe one safeguard that should be in place to protect the confid.pdf
Describe one safeguard that should be in place to protect the confid.pdf
 
HIPAA TITLE II (2)
HIPAA TITLE II (2)HIPAA TITLE II (2)
HIPAA TITLE II (2)
 
Mha690 confidentiality training-week 1, discussion 2
Mha690 confidentiality training-week 1, discussion 2Mha690 confidentiality training-week 1, discussion 2
Mha690 confidentiality training-week 1, discussion 2
 
Mha690 wk 1 fletcher
Mha690 wk 1   fletcherMha690 wk 1   fletcher
Mha690 wk 1 fletcher
 
Sylvia hipaa powerpoint presentation 2010(1)
Sylvia hipaa powerpoint presentation 2010(1)Sylvia hipaa powerpoint presentation 2010(1)
Sylvia hipaa powerpoint presentation 2010(1)
 
Mha 690 presentation hippa
Mha 690 presentation hippaMha 690 presentation hippa
Mha 690 presentation hippa
 
The Health Insurance Portability and Accountability Act 
The Health Insurance Portability and Accountability Act The Health Insurance Portability and Accountability Act 
The Health Insurance Portability and Accountability Act 
 
HIPAA , REGULATORY AFFAIRS , M.PHARM ...
HIPAA , REGULATORY AFFAIRS , M.PHARM ...HIPAA , REGULATORY AFFAIRS , M.PHARM ...
HIPAA , REGULATORY AFFAIRS , M.PHARM ...
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 

Confidentiality 9.26.13

  • 1. The Office for Civil Rights enforces the HIPAA Privacy Rule, which protects the privacy of individually identifiable health information; the HIPAA Security Rule, which sets national standards for the security of electronic protected health information; the HIPAA Breach Notification Rule, which requires covered entities and business associates to provide notification following a breach of unsecured protected health information; and the confidentiality provisions of the Patient Safety Rule, which protect identifiable information being used to analyze patient safety events and improve patient safety (United, 2013). What is the Health Insurance Portability and Accountability Act? The Health Insurance Portability and Accountability Act (HIPAA) of 1996 is set of statutes designed to improve the efficiency and effectiveness of the US health care system: • Title I: Title I of HIPAA provides rules to "improve the portability and continuity of health insurance coverage" for workers when they change employers. • Title II: Title II of HIPAA provides rules for controlling health care fraud and abuse, and includes an "Administrative Simplification" section that sets standards for enabling the electronic exchange of health information (University, 2013). What does HIPPA do? Places limits on how confidential health information can be shared with others. Establishes patient rights to control the sharing of their health information. Puts safeguards in place for confidential health information collected, maintained, used, or transmitted in electronic form What is privacy? Refers to WHAT is protected — information about an individual and the determination of WHO is permitted to use, disclose, or access the information What is security?
  • 2. Refers to HOW information is safeguarded—ensuring privacy by controlling access to information and protecting it from inappropriate disclosure and accidental or intentional destruction or loss (Upstate, 2011). Patients expect privacy when they are receiving healthcare. Patients also expect that their confidential health information will be appropriately protected. Examples of safeguards that help to ensure confidentiality are: Shred all paper containing confidential health information or place in closed receptacles When faxing, verify the fax number before sending Close doors or privacy curtains when having discussions ofconfidential health information Do not leave medical records unattended or in open areas Respect the privacy rights of employees who come here for care by affording their information the utmost confidentiality it deserves Keep confidential health information you hear or see to yourself Examples of computer safeguards to secure our information include: Protect your access by not sharing your account and/or password with others Do not write down or post your password on computer systems Never leaving a workstation signed on or left unattended with access to confidential health information Access information in computer systems when you have a need to- know the information Never disable or remove the virus detection software Take measures to protect your computer passwords so that they are not misused. Patients trust that when they share their confidential health information with healthcare staff, it will be afforded the appropriate privacy and security protections
  • 3. User education concerning virus protection User education in importance of monitoring login success/failure, and how to report discrepancies User education in password management Education on awareness Reference Sheidy, D.P. & McMahon, M.K. (2002). Hippa and training: Web based strategies for compliance. Retrieved September 26, 2013, from http://www.ehcca.com/presentations/HIPAA/sheidy-tue.pdf United States Department of Health and Human Services. (2013). Health information privacy. Retrieved September 26, 2013, from http://www.hhs.gov/ocr/privacy/index.html Upstate Medical Center. (2011). Protecting patient confidentiality and security. Retrieved September 26, 2013, from http://www.upstate.edu/forms/documents/F84037.pdf University Information Technology Services. (2013). What is HIPPA?. Retrieved September 26, 2013, from http://kb.iu.edu/data/ayyy.html