SlideShare a Scribd company logo
1 of 5
UCLA Medical Center
HIPAA
“We’ve got our eye on you!”
BRANDY MCCRARY
MHA690 WEEK 1 DISCUSSION 2 “CONFIDENTIALITY”
HIPAA
 Health Insurance Portability and Accountability Act – first
originated in 1996 and was fully implemented in 2003 (Morris,
2013).
 Recently, the Omnibus Final Rule regarding the privacy, security,
and enforcement of patient privacy was added (Morris, 2013).
 The most common type of violation involves healthcare providers
inappropriately accessing medical records of celebrities, co-
workers, friends, or family (Morris, 2013).
 Do not let your curiosity or concern get the best of you!
Consequences of doing so can lead to TERMINATION!
 Please be diligent and conscientious of your work.
Reference: Morris, K. (2013). SING A SONG OF HIPAA. Ohio Nurses Review, 88(2), 12-14.
Examples
Negligent Violations
 Improper disposal of PHI. Shred
Everything!
 Leaving protected information on
voicemails. Always request that the patient
to call back!
 Not protecting usernames and passwords.
Only YOU should have access.
 Not logging out of the computer and
leaving PHI open. Always lock the
computer.
 Social Media/Personal Cell Phones. Do not
post, text, tweet, or blog anything
regarding PHI.
Willful Violations
 Reviewing PHI of patients other than you own.
“If it’s not yours, don’t touch it.”
 Offering usernames and passwords to others.
Only YOU should be using those.
 Providing PHI to those not directly associated
with the patient. If it does not have to do with
the care/safety of the patient, it does not need to
be talked about.
 Selling PHI. It is protected and punishable by
law.
 Using PHI against others. Again, it’s protected
information and punishable by law.
Reference: Morris, K. (2013). SING A SONG OF HIPAA. Ohio Nurses Review, 88(2), 12-14.
“We’ve got our eye on YOU!”
 Because HIPPA Compliance has been an issue in the past,
please be mindful of the do’s and do not's.
 If you question it, you probably shouldn’t be doing it.
 Every individual is responsible for their own actions.
 As a department, let’s work together to be HIPAA
compliant at all times.
 If you see someone violating HIPAA, document it and
contact your manager or the HIM Director.
Updates
 The internet usage and email policies have been updated.
 Please take this time to review the policies and contact your
manager should you have any questions regarding the updates.
 As always, any physical piece of paper with any patient
information on it should be kept private and shredded when
finished.
 Please, please, please be sure to lock/log out of the
computer at ANYTIME when you walk away from
the computer.

More Related Content

Viewers also liked (7)

Asad ali shah
Asad ali shahAsad ali shah
Asad ali shah
 
【國中】整數加減
【國中】整數加減【國中】整數加減
【國中】整數加減
 
El credo (1)
El credo (1)El credo (1)
El credo (1)
 
Wie doet het met wie in de zorg
Wie doet het met wie in de zorgWie doet het met wie in de zorg
Wie doet het met wie in de zorg
 
110917 u2plusデモ
110917 u2plusデモ110917 u2plusデモ
110917 u2plusデモ
 
Apple PP
Apple PPApple PP
Apple PP
 
Cancerday 7th nov
Cancerday 7th novCancerday 7th nov
Cancerday 7th nov
 

Similar to HIPAA

Training on confidentiality MHA690 Hayden
Training on confidentiality MHA690 HaydenTraining on confidentiality MHA690 Hayden
Training on confidentiality MHA690 Hayden
haydens
 
Hipaa overview2011 student orientation
Hipaa overview2011 student orientationHipaa overview2011 student orientation
Hipaa overview2011 student orientation
University of Miami
 
Mha690 wk 1 fletcher
Mha690 wk 1   fletcherMha690 wk 1   fletcher
Mha690 wk 1 fletcher
Emed32
 
Breach of Security Final Paper
Breach of Security Final PaperBreach of Security Final Paper
Breach of Security Final Paper
Andrew Blumenreich
 
Week 1 discussion 2
Week 1 discussion 2Week 1 discussion 2
Week 1 discussion 2
girly12
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA Basics
Karna *
 

Similar to HIPAA (20)

Training on confidentiality MHA690 Hayden
Training on confidentiality MHA690 HaydenTraining on confidentiality MHA690 Hayden
Training on confidentiality MHA690 Hayden
 
HIPAA AND INFORMATION TECHNOLOGY
HIPAA AND INFORMATION TECHNOLOGYHIPAA AND INFORMATION TECHNOLOGY
HIPAA AND INFORMATION TECHNOLOGY
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Privacy and Security Training
Privacy and Security TrainingPrivacy and Security Training
Privacy and Security Training
 
Hipaa overview2011 student orientation
Hipaa overview2011 student orientationHipaa overview2011 student orientation
Hipaa overview2011 student orientation
 
Mha690 wk 1 fletcher
Mha690 wk 1   fletcherMha690 wk 1   fletcher
Mha690 wk 1 fletcher
 
HIPAA
HIPAAHIPAA
HIPAA
 
HIPAA
HIPAAHIPAA
HIPAA
 
Patient confidentiality MHA 690
Patient confidentiality MHA 690Patient confidentiality MHA 690
Patient confidentiality MHA 690
 
Breach of Security Final Paper
Breach of Security Final PaperBreach of Security Final Paper
Breach of Security Final Paper
 
Dustin HIPAA
Dustin HIPAADustin HIPAA
Dustin HIPAA
 
Healthcare law for Introduction to Health Care
Healthcare law for Introduction to Health CareHealthcare law for Introduction to Health Care
Healthcare law for Introduction to Health Care
 
Protecting yourself and others
Protecting yourself and othersProtecting yourself and others
Protecting yourself and others
 
Week 1 discussion 2
Week 1 discussion 2Week 1 discussion 2
Week 1 discussion 2
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
HIPAA
HIPAAHIPAA
HIPAA
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA Basics
 
MHA 690-Confidentiality
MHA 690-ConfidentialityMHA 690-Confidentiality
MHA 690-Confidentiality
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 

HIPAA

  • 1. UCLA Medical Center HIPAA “We’ve got our eye on you!” BRANDY MCCRARY MHA690 WEEK 1 DISCUSSION 2 “CONFIDENTIALITY”
  • 2. HIPAA  Health Insurance Portability and Accountability Act – first originated in 1996 and was fully implemented in 2003 (Morris, 2013).  Recently, the Omnibus Final Rule regarding the privacy, security, and enforcement of patient privacy was added (Morris, 2013).  The most common type of violation involves healthcare providers inappropriately accessing medical records of celebrities, co- workers, friends, or family (Morris, 2013).  Do not let your curiosity or concern get the best of you! Consequences of doing so can lead to TERMINATION!  Please be diligent and conscientious of your work. Reference: Morris, K. (2013). SING A SONG OF HIPAA. Ohio Nurses Review, 88(2), 12-14.
  • 3. Examples Negligent Violations  Improper disposal of PHI. Shred Everything!  Leaving protected information on voicemails. Always request that the patient to call back!  Not protecting usernames and passwords. Only YOU should have access.  Not logging out of the computer and leaving PHI open. Always lock the computer.  Social Media/Personal Cell Phones. Do not post, text, tweet, or blog anything regarding PHI. Willful Violations  Reviewing PHI of patients other than you own. “If it’s not yours, don’t touch it.”  Offering usernames and passwords to others. Only YOU should be using those.  Providing PHI to those not directly associated with the patient. If it does not have to do with the care/safety of the patient, it does not need to be talked about.  Selling PHI. It is protected and punishable by law.  Using PHI against others. Again, it’s protected information and punishable by law. Reference: Morris, K. (2013). SING A SONG OF HIPAA. Ohio Nurses Review, 88(2), 12-14.
  • 4. “We’ve got our eye on YOU!”  Because HIPPA Compliance has been an issue in the past, please be mindful of the do’s and do not's.  If you question it, you probably shouldn’t be doing it.  Every individual is responsible for their own actions.  As a department, let’s work together to be HIPAA compliant at all times.  If you see someone violating HIPAA, document it and contact your manager or the HIM Director.
  • 5. Updates  The internet usage and email policies have been updated.  Please take this time to review the policies and contact your manager should you have any questions regarding the updates.  As always, any physical piece of paper with any patient information on it should be kept private and shredded when finished.  Please, please, please be sure to lock/log out of the computer at ANYTIME when you walk away from the computer.