SlideShare a Scribd company logo
1 of 5
Confidentiality
How to save your organization
Training
While there is no guarantee within an
organization that all employees will honor
confidentially in the workplace, legally providing
training in this area can assist with an liability.
There are several method of training that can
assist with providing adequate training and
follow up for sustainability.
It is the responsibility of the organization to train all staff on patient confidentiality. The standard “I didn’t know” is no longer
accepted as a reasoning to expose private health information. The HITECH Act has now made this a priority. As noted, “Employees
who violate the rules because they don't know them make inviting targets for new enforcement initiatives under the Health
Information Technology for Economic and Clinical Health (HITECH) Act.The lesson for all offices is to train employees on
HITECH and on new and existing Health Insurance Portability and Accountability Act (HIPAA) rules. It is imperative to understand
the penalties for workforce mistakes and the effects it could have on your practice and your staff.”(Salz, 2013)
Some key areas to focus your employee training on is privacy, security, unsecured breaches,HIPAA rules and regulations. Also
providing an understand of how these rules and regulations affect your organization and their employment is critical. With the new
ways of training, many organizations are utilizing online systems that can monitor the completion of the training and test the
employee at the end. This has be most successful due to having documentation of keystrokes, quizzes and a final test for employees
as proof of successful completion; done annually, during the first 30 days of hire and with any IT upgrades.
Notifying employees of any changes to privacy rules and new security measures is also prevalent in order to stay compliant as an
organization and provide ongoing training. The follow key areas should be the focus of training:
● PHI
● HITECH Act
● HIPAA
● Passwords
● Sharing Patient Care Information
● Personal computer usage with company equipment
● Social Media and Patients
There is also another area that needs to be addressed. With the new “Cloud” technology, organizations need to make decisions
about advanced IT purchases. This type of investment can allow more breaches in security and provided more avenues for not
only clinically staff to be susceptible to privacy breaches, but IT and computer hackers can also have privy to patient care
information. As noted, “Patient information in the electronic realm is information that is vulnerable. The efficiencies and
clinical supports made possible by the electronic use and sharing of medical data come with a whole new set of threats,
medical identity theft among them. Health systems that choose to migrate their information technology services to the
universe of virtual computing-the cloud-will face still other security challenges.”(Birk, 2013) With this in mind, continuous
training is essential as an organization makes decisions to upgrade any Healthcare IT systems. The best way to handle this is
seeing IT and privacy and security as one in the same.
Ultimately, each organization, based upon size and organizational structures need to decided the best method of training.
However, what is important is to make sure training is provided continuously and with a system that will provide whether the
employee has understood the laws.
References
Birk, S. (2013). Protecting patient medical data: The C-suite's role. Healthcare Executive, 28(5), 20-2, 24, 26 passim.
Salz, T. (2013). HIPAA: Training critical to protect patients, practice. Medical Economics, 90(18), 43-44,47.

More Related Content

What's hot

Information Governance in the Healthcare Industry
Information Governance in the Healthcare IndustryInformation Governance in the Healthcare Industry
Information Governance in the Healthcare IndustryAmber Guy
 
MeHI Privacy & Security Webinar 3.18.15
MeHI Privacy & Security Webinar 3.18.15MeHI Privacy & Security Webinar 3.18.15
MeHI Privacy & Security Webinar 3.18.15MassEHealth
 
Avior Healthcare Security Compliance Webcast Final1
Avior Healthcare Security Compliance Webcast Final1Avior Healthcare Security Compliance Webcast Final1
Avior Healthcare Security Compliance Webcast Final1jhietala
 
Identity and Access Intelligence
Identity and Access IntelligenceIdentity and Access Intelligence
Identity and Access IntelligenceTim Bell
 
Confidentiality and Security Training
Confidentiality and Security TrainingConfidentiality and Security Training
Confidentiality and Security TrainingSuezqrdh
 
What is HIPAA Compliance?
What is HIPAA Compliance?What is HIPAA Compliance?
What is HIPAA Compliance?Power Admin LLC
 
Cyber Risk in Healthcare Industry- Are you Protected?
Cyber Risk in Healthcare Industry- Are you Protected?  Cyber Risk in Healthcare Industry- Are you Protected?
Cyber Risk in Healthcare Industry- Are you Protected? Mark Merrill
 
Role-Based Access Governance and HIPAA Compliance: A Pragmatic Approach
Role-Based Access Governance and HIPAA Compliance: A Pragmatic ApproachRole-Based Access Governance and HIPAA Compliance: A Pragmatic Approach
Role-Based Access Governance and HIPAA Compliance: A Pragmatic ApproachEMC
 
Training innovations information governance slideshare 2015
Training innovations information governance slideshare 2015Training innovations information governance slideshare 2015
Training innovations information governance slideshare 2015Patrick Doyle
 
The benefits of technology standards it-toolkits
The benefits of technology standards   it-toolkitsThe benefits of technology standards   it-toolkits
The benefits of technology standards it-toolkitsIT-Toolkits.org
 
An IBM Perspective: Healthcare in the Cloud
An IBM Perspective: Healthcare in the CloudAn IBM Perspective: Healthcare in the Cloud
An IBM Perspective: Healthcare in the CloudIBM in Healthcare
 
Hot Topics in Privacy and Security
Hot Topics in Privacy and SecurityHot Topics in Privacy and Security
Hot Topics in Privacy and SecurityPYA, P.C.
 
Information Governance – What Does a Modern Program Look Like?
Information Governance – What Does a Modern Program Look Like?Information Governance – What Does a Modern Program Look Like?
Information Governance – What Does a Modern Program Look Like?Winston & Strawn LLP
 
Scenario you have recently been hired as a chief information gov
Scenario you have recently been hired as a chief information govScenario you have recently been hired as a chief information gov
Scenario you have recently been hired as a chief information govAKHIL969626
 
Connected Health Reference Architecture
Connected Health Reference ArchitectureConnected Health Reference Architecture
Connected Health Reference ArchitectureWSO2
 
HCA496 HEALTH INFORMATICS NOW
HCA496 HEALTH INFORMATICS NOWHCA496 HEALTH INFORMATICS NOW
HCA496 HEALTH INFORMATICS NOWNelson Walker
 
Corepoint_White Paper_0815-3
Corepoint_White Paper_0815-3Corepoint_White Paper_0815-3
Corepoint_White Paper_0815-3Frank Irving
 

What's hot (20)

Information Governance in the Healthcare Industry
Information Governance in the Healthcare IndustryInformation Governance in the Healthcare Industry
Information Governance in the Healthcare Industry
 
MeHI Privacy & Security Webinar 3.18.15
MeHI Privacy & Security Webinar 3.18.15MeHI Privacy & Security Webinar 3.18.15
MeHI Privacy & Security Webinar 3.18.15
 
Healthcare and Cyber security
Healthcare and Cyber securityHealthcare and Cyber security
Healthcare and Cyber security
 
Avior Healthcare Security Compliance Webcast Final1
Avior Healthcare Security Compliance Webcast Final1Avior Healthcare Security Compliance Webcast Final1
Avior Healthcare Security Compliance Webcast Final1
 
Identity and Access Intelligence
Identity and Access IntelligenceIdentity and Access Intelligence
Identity and Access Intelligence
 
Confidentiality and Security Training
Confidentiality and Security TrainingConfidentiality and Security Training
Confidentiality and Security Training
 
What is HIPAA Compliance?
What is HIPAA Compliance?What is HIPAA Compliance?
What is HIPAA Compliance?
 
Cyber Risk in Healthcare Industry- Are you Protected?
Cyber Risk in Healthcare Industry- Are you Protected?  Cyber Risk in Healthcare Industry- Are you Protected?
Cyber Risk in Healthcare Industry- Are you Protected?
 
Role-Based Access Governance and HIPAA Compliance: A Pragmatic Approach
Role-Based Access Governance and HIPAA Compliance: A Pragmatic ApproachRole-Based Access Governance and HIPAA Compliance: A Pragmatic Approach
Role-Based Access Governance and HIPAA Compliance: A Pragmatic Approach
 
Hcc week 1dq2
Hcc week 1dq2Hcc week 1dq2
Hcc week 1dq2
 
Training innovations information governance slideshare 2015
Training innovations information governance slideshare 2015Training innovations information governance slideshare 2015
Training innovations information governance slideshare 2015
 
The benefits of technology standards it-toolkits
The benefits of technology standards   it-toolkitsThe benefits of technology standards   it-toolkits
The benefits of technology standards it-toolkits
 
Hcc week 1dq2
Hcc week 1dq2Hcc week 1dq2
Hcc week 1dq2
 
An IBM Perspective: Healthcare in the Cloud
An IBM Perspective: Healthcare in the CloudAn IBM Perspective: Healthcare in the Cloud
An IBM Perspective: Healthcare in the Cloud
 
Hot Topics in Privacy and Security
Hot Topics in Privacy and SecurityHot Topics in Privacy and Security
Hot Topics in Privacy and Security
 
Information Governance – What Does a Modern Program Look Like?
Information Governance – What Does a Modern Program Look Like?Information Governance – What Does a Modern Program Look Like?
Information Governance – What Does a Modern Program Look Like?
 
Scenario you have recently been hired as a chief information gov
Scenario you have recently been hired as a chief information govScenario you have recently been hired as a chief information gov
Scenario you have recently been hired as a chief information gov
 
Connected Health Reference Architecture
Connected Health Reference ArchitectureConnected Health Reference Architecture
Connected Health Reference Architecture
 
HCA496 HEALTH INFORMATICS NOW
HCA496 HEALTH INFORMATICS NOWHCA496 HEALTH INFORMATICS NOW
HCA496 HEALTH INFORMATICS NOW
 
Corepoint_White Paper_0815-3
Corepoint_White Paper_0815-3Corepoint_White Paper_0815-3
Corepoint_White Paper_0815-3
 

Viewers also liked

Analisis kebutuhan windows server
Analisis kebutuhan windows serverAnalisis kebutuhan windows server
Analisis kebutuhan windows servercyberkibra
 
FINANCIAL VULNERABILITY
FINANCIAL VULNERABILITYFINANCIAL VULNERABILITY
FINANCIAL VULNERABILITYShasha Li
 
Lakshmi TradeSoft Product Brochure
Lakshmi TradeSoft Product BrochureLakshmi TradeSoft Product Brochure
Lakshmi TradeSoft Product BrochurePriya R
 
Created Ulfah (SMKN 2 SImpang Empat) Memproses perjalanan bisnis
Created Ulfah (SMKN 2 SImpang Empat) Memproses perjalanan bisnisCreated Ulfah (SMKN 2 SImpang Empat) Memproses perjalanan bisnis
Created Ulfah (SMKN 2 SImpang Empat) Memproses perjalanan bisnisulfahxiiapd
 
Generating Content Discovery with Syndicated Distribution
Generating Content Discovery with Syndicated DistributionGenerating Content Discovery with Syndicated Distribution
Generating Content Discovery with Syndicated DistributionSt Baldricks Foundation
 
Благодійний осінній ярмарок - 2016
Благодійний осінній ярмарок - 2016Благодійний осінній ярмарок - 2016
Благодійний осінній ярмарок - 2016orestznak
 

Viewers also liked (10)

Analisis kebutuhan windows server
Analisis kebutuhan windows serverAnalisis kebutuhan windows server
Analisis kebutuhan windows server
 
FINANCIAL VULNERABILITY
FINANCIAL VULNERABILITYFINANCIAL VULNERABILITY
FINANCIAL VULNERABILITY
 
AME C of C
AME C of CAME C of C
AME C of C
 
Lakshmi TradeSoft Product Brochure
Lakshmi TradeSoft Product BrochureLakshmi TradeSoft Product Brochure
Lakshmi TradeSoft Product Brochure
 
Created Ulfah (SMKN 2 SImpang Empat) Memproses perjalanan bisnis
Created Ulfah (SMKN 2 SImpang Empat) Memproses perjalanan bisnisCreated Ulfah (SMKN 2 SImpang Empat) Memproses perjalanan bisnis
Created Ulfah (SMKN 2 SImpang Empat) Memproses perjalanan bisnis
 
C7_Reid_Nicole
C7_Reid_NicoleC7_Reid_Nicole
C7_Reid_Nicole
 
Generating Content Discovery with Syndicated Distribution
Generating Content Discovery with Syndicated DistributionGenerating Content Discovery with Syndicated Distribution
Generating Content Discovery with Syndicated Distribution
 
Благодійний осінній ярмарок - 2016
Благодійний осінній ярмарок - 2016Благодійний осінній ярмарок - 2016
Благодійний осінній ярмарок - 2016
 
NANDAN KANAN
NANDAN KANAN NANDAN KANAN
NANDAN KANAN
 
Oct. 5, 2015 JKC
Oct. 5, 2015 JKCOct. 5, 2015 JKC
Oct. 5, 2015 JKC
 

Similar to Confidentiality

Ensuring Patient Confidentiality[1]
Ensuring Patient Confidentiality[1]Ensuring Patient Confidentiality[1]
Ensuring Patient Confidentiality[1]romill0700
 
Nur3563group8 cis
Nur3563group8 cisNur3563group8 cis
Nur3563group8 cistb45004
 
Running head EFFECTIVENESS OF HEALTH CARE IT SYSTEMS 1EFFE.docx
Running head EFFECTIVENESS OF HEALTH CARE IT SYSTEMS 1EFFE.docxRunning head EFFECTIVENESS OF HEALTH CARE IT SYSTEMS 1EFFE.docx
Running head EFFECTIVENESS OF HEALTH CARE IT SYSTEMS 1EFFE.docxsusanschei
 
Protection of Patient Information.docx
Protection of Patient Information.docxProtection of Patient Information.docx
Protection of Patient Information.docxWawire Wycliffe
 
Confidentiality Training
Confidentiality TrainingConfidentiality Training
Confidentiality Trainingashley2k
 
Cyb 690 cybersecurity program template directions the foll
Cyb 690 cybersecurity program template directions the follCyb 690 cybersecurity program template directions the foll
Cyb 690 cybersecurity program template directions the follAISHA232980
 
Healthcare Cybersecurity Whitepaper FINAL
Healthcare Cybersecurity Whitepaper FINALHealthcare Cybersecurity Whitepaper FINAL
Healthcare Cybersecurity Whitepaper FINALSteve Knapp
 
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudPerspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudCheryl Goldberg
 
Him500 Milestone 3Precious Teasley Southern New
Him500 Milestone 3Precious Teasley Southern New Him500 Milestone 3Precious Teasley Southern New
Him500 Milestone 3Precious Teasley Southern New SusanaFurman449
 
HIPAA and Data Breaches_ Mitigating Risks and Ensuring Security - JK Tech.pptx
HIPAA and Data Breaches_ Mitigating Risks and Ensuring Security - JK Tech.pptxHIPAA and Data Breaches_ Mitigating Risks and Ensuring Security - JK Tech.pptx
HIPAA and Data Breaches_ Mitigating Risks and Ensuring Security - JK Tech.pptxBobRapier
 
HIPAA and Data Breaches_ Mitigating Risks and Ensuring Security - JK Tech.pptx
HIPAA and Data Breaches_ Mitigating Risks and Ensuring Security - JK Tech.pptxHIPAA and Data Breaches_ Mitigating Risks and Ensuring Security - JK Tech.pptx
HIPAA and Data Breaches_ Mitigating Risks and Ensuring Security - JK Tech.pptxBobRapier
 
THINGS TO BE FIXED1ST PAPER - - History of Healthcare informat.docx
THINGS TO BE FIXED1ST PAPER - - History of Healthcare informat.docxTHINGS TO BE FIXED1ST PAPER - - History of Healthcare informat.docx
THINGS TO BE FIXED1ST PAPER - - History of Healthcare informat.docxrandymartin91030
 
Discussion2
Discussion2 Discussion2
Discussion2 amberlinn
 
Healthcare - Customer-Centric Healthcare Best Practices for CIO and CISOs
Healthcare - Customer-Centric Healthcare Best Practices for CIO and CISOsHealthcare - Customer-Centric Healthcare Best Practices for CIO and CISOs
Healthcare - Customer-Centric Healthcare Best Practices for CIO and CISOsNicholas Christiano Jr.
 
Health Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptxHealth Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptxArti Parab Academics
 
Week 1 discussion 2 - Confidentiality
Week 1   discussion 2 - ConfidentialityWeek 1   discussion 2 - Confidentiality
Week 1 discussion 2 - ConfidentialityAngie_37
 
Questions On The Healthcare System
Questions On The Healthcare SystemQuestions On The Healthcare System
Questions On The Healthcare SystemAmanda Gray
 

Similar to Confidentiality (20)

Ensuring Patient Confidentiality[1]
Ensuring Patient Confidentiality[1]Ensuring Patient Confidentiality[1]
Ensuring Patient Confidentiality[1]
 
arcsight_scmag_hcspecial
arcsight_scmag_hcspecialarcsight_scmag_hcspecial
arcsight_scmag_hcspecial
 
Nur3563group8 cis
Nur3563group8 cisNur3563group8 cis
Nur3563group8 cis
 
Running head EFFECTIVENESS OF HEALTH CARE IT SYSTEMS 1EFFE.docx
Running head EFFECTIVENESS OF HEALTH CARE IT SYSTEMS 1EFFE.docxRunning head EFFECTIVENESS OF HEALTH CARE IT SYSTEMS 1EFFE.docx
Running head EFFECTIVENESS OF HEALTH CARE IT SYSTEMS 1EFFE.docx
 
Protection of Patient Information.docx
Protection of Patient Information.docxProtection of Patient Information.docx
Protection of Patient Information.docx
 
HIPAA
HIPAAHIPAA
HIPAA
 
Confidentiality Training
Confidentiality TrainingConfidentiality Training
Confidentiality Training
 
Cyb 690 cybersecurity program template directions the foll
Cyb 690 cybersecurity program template directions the follCyb 690 cybersecurity program template directions the foll
Cyb 690 cybersecurity program template directions the foll
 
Healthcare Cybersecurity Whitepaper FINAL
Healthcare Cybersecurity Whitepaper FINALHealthcare Cybersecurity Whitepaper FINAL
Healthcare Cybersecurity Whitepaper FINAL
 
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudPerspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
 
Him500 Milestone 3Precious Teasley Southern New
Him500 Milestone 3Precious Teasley Southern New Him500 Milestone 3Precious Teasley Southern New
Him500 Milestone 3Precious Teasley Southern New
 
HIPAA and Data Breaches_ Mitigating Risks and Ensuring Security - JK Tech.pptx
HIPAA and Data Breaches_ Mitigating Risks and Ensuring Security - JK Tech.pptxHIPAA and Data Breaches_ Mitigating Risks and Ensuring Security - JK Tech.pptx
HIPAA and Data Breaches_ Mitigating Risks and Ensuring Security - JK Tech.pptx
 
HIPAA and Data Breaches_ Mitigating Risks and Ensuring Security - JK Tech.pptx
HIPAA and Data Breaches_ Mitigating Risks and Ensuring Security - JK Tech.pptxHIPAA and Data Breaches_ Mitigating Risks and Ensuring Security - JK Tech.pptx
HIPAA and Data Breaches_ Mitigating Risks and Ensuring Security - JK Tech.pptx
 
THINGS TO BE FIXED1ST PAPER - - History of Healthcare informat.docx
THINGS TO BE FIXED1ST PAPER - - History of Healthcare informat.docxTHINGS TO BE FIXED1ST PAPER - - History of Healthcare informat.docx
THINGS TO BE FIXED1ST PAPER - - History of Healthcare informat.docx
 
Discussion2
Discussion2 Discussion2
Discussion2
 
Healthcare - Customer-Centric Healthcare Best Practices for CIO and CISOs
Healthcare - Customer-Centric Healthcare Best Practices for CIO and CISOsHealthcare - Customer-Centric Healthcare Best Practices for CIO and CISOs
Healthcare - Customer-Centric Healthcare Best Practices for CIO and CISOs
 
Health Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptxHealth Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptx
 
Confidentiality Training
Confidentiality Training Confidentiality Training
Confidentiality Training
 
Week 1 discussion 2 - Confidentiality
Week 1   discussion 2 - ConfidentialityWeek 1   discussion 2 - Confidentiality
Week 1 discussion 2 - Confidentiality
 
Questions On The Healthcare System
Questions On The Healthcare SystemQuestions On The Healthcare System
Questions On The Healthcare System
 

Confidentiality

  • 1. Confidentiality How to save your organization
  • 2. Training While there is no guarantee within an organization that all employees will honor confidentially in the workplace, legally providing training in this area can assist with an liability. There are several method of training that can assist with providing adequate training and follow up for sustainability.
  • 3. It is the responsibility of the organization to train all staff on patient confidentiality. The standard “I didn’t know” is no longer accepted as a reasoning to expose private health information. The HITECH Act has now made this a priority. As noted, “Employees who violate the rules because they don't know them make inviting targets for new enforcement initiatives under the Health Information Technology for Economic and Clinical Health (HITECH) Act.The lesson for all offices is to train employees on HITECH and on new and existing Health Insurance Portability and Accountability Act (HIPAA) rules. It is imperative to understand the penalties for workforce mistakes and the effects it could have on your practice and your staff.”(Salz, 2013) Some key areas to focus your employee training on is privacy, security, unsecured breaches,HIPAA rules and regulations. Also providing an understand of how these rules and regulations affect your organization and their employment is critical. With the new ways of training, many organizations are utilizing online systems that can monitor the completion of the training and test the employee at the end. This has be most successful due to having documentation of keystrokes, quizzes and a final test for employees as proof of successful completion; done annually, during the first 30 days of hire and with any IT upgrades. Notifying employees of any changes to privacy rules and new security measures is also prevalent in order to stay compliant as an organization and provide ongoing training. The follow key areas should be the focus of training: ● PHI ● HITECH Act ● HIPAA ● Passwords ● Sharing Patient Care Information ● Personal computer usage with company equipment ● Social Media and Patients
  • 4. There is also another area that needs to be addressed. With the new “Cloud” technology, organizations need to make decisions about advanced IT purchases. This type of investment can allow more breaches in security and provided more avenues for not only clinically staff to be susceptible to privacy breaches, but IT and computer hackers can also have privy to patient care information. As noted, “Patient information in the electronic realm is information that is vulnerable. The efficiencies and clinical supports made possible by the electronic use and sharing of medical data come with a whole new set of threats, medical identity theft among them. Health systems that choose to migrate their information technology services to the universe of virtual computing-the cloud-will face still other security challenges.”(Birk, 2013) With this in mind, continuous training is essential as an organization makes decisions to upgrade any Healthcare IT systems. The best way to handle this is seeing IT and privacy and security as one in the same. Ultimately, each organization, based upon size and organizational structures need to decided the best method of training. However, what is important is to make sure training is provided continuously and with a system that will provide whether the employee has understood the laws.
  • 5. References Birk, S. (2013). Protecting patient medical data: The C-suite's role. Healthcare Executive, 28(5), 20-2, 24, 26 passim. Salz, T. (2013). HIPAA: Training critical to protect patients, practice. Medical Economics, 90(18), 43-44,47.