SlideShare a Scribd company logo
1 of 15
Upholding
Confidentiality
It is your ethical responsibility
       Theresa Tapley
MHA690: Health Care Capstone
     Ashford University
       Dr. David Cole
        April 23, 2013
Objectives
 Understanding    of HIPAA
 Ethical Responsibility to keep each and
  every patient’s PHI confidential
 Patient Privacy Rule and Security Rules
 Identification of what PHI is
 Ways to protect PHI
 Tips for electronic confidentiality
  protections
 Consequences if confidentiality or PHI
  mishandlement
What is Health Insurance Portability and
     Accountability Act (HIPAA)?
 HIPPA  is a federal law that gives an
  individual the right of protection of their
  personal health information (PHI).
 PHI includes all medical and personal
  information and must be protected
  whether communication is
  verbal, written, or electronic.

(U.S. Department HHS, 2012)
Forms of Sensitive Information
          Sensitive Information exists in various forms




Printed                  Spoken                Electronic

       It is the responsibility of every employee to
 protect the privacy and security of sensitive information
                         in ALL forms
What Information is Considered Confidential
         and must be Protected?
                          Personal billing information

                          All medical records

                          Conversations between
                           physician and other
                           medical staff regarding a
                           patient

                          Information about a
                           patient within their
                           Insurance carrier’s
                           database
Patient Privacy Rule Rights
            The right to see and obtain a copy of
             their health record

            The right to have corrections added to
             their personal health record

            The right to receive notice about how
             their health information will be used or
             shared for certain purposes

            The right to get a report of when and
             why their health information was shared

            The right to file a complaint with the
             provider or health insurer

            The right to file a complaint with the U. S.
             Government
Personal Health Information
How to keep it confidential
                 Never leave medical
                  records where others can
                  gain access to them

                 PHI should be guarded and
                  kept confidential, shared
                  only with healthcare
                  providers involved in their
                  healthcare

                 PHI is confidential and
                  should not be viewed on
                  paper or on computer by
                  unauthorized staff
Ways to Protect Confidentiality of PHI
   PHI should only be shared with other healthcare
    professionals directly involved in an individual’s
    care
    Records are kept locked and only people with a
    need to see information about patients have
    access to them
   Employees who use computerized patient records
    to not leave their computers logged in to the
    patient information system while they are not at
    their workstations. Computer screens containing
    patient information are turned away from the view
    of the public or people passing by.
More Ways to Protect Confidentiality of PHI
   Posted or written patient information maintained in
    work areas such as nurses’ stations or front desk is
    kept covered from the public.
   Discussions about patient care are kept private to
    reduce the likelihood that those who do not need
    to know will overhear.
   Electronic records are kept secure, and the facility
    monitors who gains access to records to ensure
    that they are being used appropriately.
   Paper records are always shredded or placed in
    closed receptacles for delivery to a company that
    destroys records for the facility. They must never
    be left in the garbage.
Understanding the Security Rule
   Specifies a series of administrative, physical, and technical
    safeguards for covered entities to use to assure the
    confidentiality, integrity, and availability of electronic
    protected health information

   The Security Rule defines “confidentiality” to mean that e-PHI is
    not available or disclosed to unauthorized persons. The Security
    Rule's confidentiality requirements support the Privacy Rule's
    prohibitions against improper uses and disclosures of PHI

   The Security rule also promotes the two additional goals of
    maintaining the integrity and availability of e-PHI

   Designation of a security official who is responsible for
    developing and implement its security policies and procedures
Electronic confidentiality protections
                       Keep passwords and
                        other security
                        features that restrict
                        access to your
                        computer private
                       Never share
                        password access or
                        log in to the health
                        information system
                        using a borrowed
                        credential
More steps for protecting
         electronic information
   Point computer screen away from the public
   Never walk away from your computer with
    PHI up and in view of a passerby
   Never remove computer equipment, disks, or
    software unless instructed to do so by your
    supervisor
   Never send confidential patient information in
    an e-mail unless it is encrypted
   Always double-check the address line of an
    email before you send it.
Penalties for Breaches

Breaches of the HIPAA Privacy and Security Rules have
serious ramifications for all involved. In addition to
sanctions imposed by this organization, such breaches
may result in civil and criminal penalties.

   Statutory and regulatory penalties for breaches may
                         include:

Civil: $50,000 per incident, up to $1.5 million per calendar
year for violations that are not corrected

Criminal: $50,000 to $250,000 in fines and up to 10 years in
prison

In addition, institutions that fail to correct a HIPAA violation
may be fined up to $50,000 per violation.
Best Practice Reminders

   DO keep computer sign-on codes and passwords secret, and DO NOT allow unauthorized
   persons access to your computer. Also, use locked screensavers for added privacy.
   DO keep notes, files, memory sticks, and computers in a secure place, and be careful to NOT
   leave them in open areas outside your workplace, such as a library, cafeteria, or airport.
   DO NOT place PHI or PII on a mobile device without required approval. DO encrypt mobile
   devices that contain PHI or PII.
   DO hold discussions of PHI in private areas and for job-related reasons only. Also, be aware of
   places where others might overhear conversations, such as in reception areas.
   DO make certain when mailing documents that no sensitive information is shown on postcards or
   through envelope windows, and that envelopes are closed securely.
   DO NOT use unsealed campus mail envelopes when sending sensitive information to another
   employee.
   DO follow procedures for the proper disposal of sensitive information, such as shredding
   documents or using locked recycling drop boxes.
   When sending an e-mail, DO NOT include PHI or other sensitive information such as Social
   Security numbers, unless you have the proper written approval to store the information and
   encrypted your computer or e-mail.

(UNC, 2013)
References
HIPAA (n.d.) HIPAA training handbook for the healthcare staff: An
    introduction to confidentiality and privacy under HIPAA. Retrieved from
    website: http://www.regalmed.com/pdfs/HIPAA_Handbook.pdf

Kongstvedt, P.R. (2007). Essentials of managed health care (5th ed.). MA:
    Jones and Bartlett Publishers.

U.S. Department of Health & Human Services (2012). Health Information
      Privacy. Retrieved form U.S. Department of Health and Human Services
      website:
      http://www.hhs.gov/ocr/privacy/hipaa/understanding/consumers/ind
      ex.html

University of North Carolina (UNC) (2013). HIPAA, privacy, & security.
     Retrieved from website:
     http://www.unc.edu/hipaa/Annual%20HIPAA%20Training%20current.p
     df

More Related Content

What's hot

Patients’ privacy and confidentiality
Patients’ privacy and confidentialityPatients’ privacy and confidentiality
Patients’ privacy and confidentialitybernardsanch
 
HIPAA in 2023: Changes, Updates, and Best Practices
HIPAA in 2023: Changes, Updates, and Best PracticesHIPAA in 2023: Changes, Updates, and Best Practices
HIPAA in 2023: Changes, Updates, and Best PracticesConference Panel
 
Patient Privacy and Safety in Healthcare
Patient Privacy and Safety in HealthcarePatient Privacy and Safety in Healthcare
Patient Privacy and Safety in HealthcareQueen Myers
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data SecurityWilmerHale
 
Protecting patient privacy and confidentiality
Protecting patient privacy and confidentialityProtecting patient privacy and confidentiality
Protecting patient privacy and confidentialityTiffany Cochran
 
Confidentiality in the Workplace
Confidentiality in the WorkplaceConfidentiality in the Workplace
Confidentiality in the Workplacesalvarez63
 
The importance of confidentiality
The importance of confidentialityThe importance of confidentiality
The importance of confidentialityMOTHOM0556
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA BasicsKarna *
 
Data protection ppt
Data protection pptData protection ppt
Data protection pptgrahamwell
 
Privacy and confidentiality
Privacy and confidentialityPrivacy and confidentiality
Privacy and confidentialityjaredbrady
 
Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protectionsp_krishna
 
MODULE 8 - PRIVACY AND CONFIDENTIALITY
MODULE 8 - PRIVACY AND CONFIDENTIALITYMODULE 8 - PRIVACY AND CONFIDENTIALITY
MODULE 8 - PRIVACY AND CONFIDENTIALITYDr Ghaiath Hussein
 
Information classification
Information classificationInformation classification
Information classificationJyothsna Sridhar
 
Privacy in India: Legal issues
Privacy in India: Legal issuesPrivacy in India: Legal issues
Privacy in India: Legal issuesSagar Rahurkar
 

What's hot (20)

Data protection
Data protectionData protection
Data protection
 
Patients’ privacy and confidentiality
Patients’ privacy and confidentialityPatients’ privacy and confidentiality
Patients’ privacy and confidentiality
 
HIPAA in 2023: Changes, Updates, and Best Practices
HIPAA in 2023: Changes, Updates, and Best PracticesHIPAA in 2023: Changes, Updates, and Best Practices
HIPAA in 2023: Changes, Updates, and Best Practices
 
Patient Privacy and Safety in Healthcare
Patient Privacy and Safety in HealthcarePatient Privacy and Safety in Healthcare
Patient Privacy and Safety in Healthcare
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
 
Protecting patient privacy and confidentiality
Protecting patient privacy and confidentialityProtecting patient privacy and confidentiality
Protecting patient privacy and confidentiality
 
Confidentiality in the Workplace
Confidentiality in the WorkplaceConfidentiality in the Workplace
Confidentiality in the Workplace
 
Health Information Privacy and Security
Health Information Privacy and SecurityHealth Information Privacy and Security
Health Information Privacy and Security
 
The importance of confidentiality
The importance of confidentialityThe importance of confidentiality
The importance of confidentiality
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA Basics
 
Basic HIPAA Training by CMU
Basic HIPAA Training by CMUBasic HIPAA Training by CMU
Basic HIPAA Training by CMU
 
Data protection ppt
Data protection pptData protection ppt
Data protection ppt
 
Privacy and confidentiality
Privacy and confidentialityPrivacy and confidentiality
Privacy and confidentiality
 
Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protection
 
MODULE 8 - PRIVACY AND CONFIDENTIALITY
MODULE 8 - PRIVACY AND CONFIDENTIALITYMODULE 8 - PRIVACY AND CONFIDENTIALITY
MODULE 8 - PRIVACY AND CONFIDENTIALITY
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Personal Data Protection in Malaysia
Personal Data Protection in MalaysiaPersonal Data Protection in Malaysia
Personal Data Protection in Malaysia
 
PDPA 2010 at office (HairulHafiz)
PDPA 2010 at office (HairulHafiz)PDPA 2010 at office (HairulHafiz)
PDPA 2010 at office (HairulHafiz)
 
Information classification
Information classificationInformation classification
Information classification
 
Privacy in India: Legal issues
Privacy in India: Legal issuesPrivacy in India: Legal issues
Privacy in India: Legal issues
 

Viewers also liked

Confidentiality in Healthcare
Confidentiality in HealthcareConfidentiality in Healthcare
Confidentiality in Healthcarekmasterson
 
Induction Slideshow Privacy And Confidentiality
Induction Slideshow  Privacy And ConfidentialityInduction Slideshow  Privacy And Confidentiality
Induction Slideshow Privacy And ConfidentialityD S
 
The importance of confidentiality
The importance of confidentialityThe importance of confidentiality
The importance of confidentialityswilson0050
 
Confidentiality
Confidentiality Confidentiality
Confidentiality pcsamuels10
 
Medico legal case
Medico legal caseMedico legal case
Medico legal caseNc Das
 
Confidentiality
ConfidentialityConfidentiality
ConfidentialityLLSS64
 

Viewers also liked (9)

Confidentiality in Healthcare
Confidentiality in HealthcareConfidentiality in Healthcare
Confidentiality in Healthcare
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Induction Slideshow Privacy And Confidentiality
Induction Slideshow  Privacy And ConfidentialityInduction Slideshow  Privacy And Confidentiality
Induction Slideshow Privacy And Confidentiality
 
The importance of confidentiality
The importance of confidentialityThe importance of confidentiality
The importance of confidentiality
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Confidentiality
Confidentiality Confidentiality
Confidentiality
 
Medical ethics
Medical ethicsMedical ethics
Medical ethics
 
Medico legal case
Medico legal caseMedico legal case
Medico legal case
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 

Similar to Upholding confidentiality

Privacy & confedentiality
Privacy & confedentialityPrivacy & confedentiality
Privacy & confedentialityHemang Patel
 
Confidentiality
ConfidentialityConfidentiality
Confidentialityloletawoo
 
Hippa final JU nursing informatics
Hippa final JU nursing informaticsHippa final JU nursing informatics
Hippa final JU nursing informaticskmcanty
 
Patient Confidentiality Training Presentation (1)
Patient Confidentiality Training Presentation (1)Patient Confidentiality Training Presentation (1)
Patient Confidentiality Training Presentation (1)DonnaShockley
 
Patient confidentiality MHA 690
Patient confidentiality MHA 690Patient confidentiality MHA 690
Patient confidentiality MHA 690AMSIMM9932
 
Wk1 discussion 2
Wk1 discussion 2Wk1 discussion 2
Wk1 discussion 2jodimw
 
Confidentiality
ConfidentialityConfidentiality
ConfidentialityRamiAboali
 
Hipaa basics pp2
Hipaa basics pp2Hipaa basics pp2
Hipaa basics pp2martykoepke
 
Hippa training for healthcare employees
Hippa training for healthcare employeesHippa training for healthcare employees
Hippa training for healthcare employeesaminahallen
 
Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)bholmes
 
2017 HIPAA Clinical Research Training
2017 HIPAA Clinical Research Training2017 HIPAA Clinical Research Training
2017 HIPAA Clinical Research TrainingCynthia Holland
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013LeRoy Ulibarri
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013LeRoy Ulibarri
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013LeRoy Ulibarri
 
Sylvia hipaa powerpoint presentation 2010(1)
Sylvia hipaa powerpoint presentation 2010(1)Sylvia hipaa powerpoint presentation 2010(1)
Sylvia hipaa powerpoint presentation 2010(1)bholmes
 
Mha690 wk 1 fletcher
Mha690 wk 1   fletcherMha690 wk 1   fletcher
Mha690 wk 1 fletcherEmed32
 
Hipaa education
Hipaa educationHipaa education
Hipaa educationeklundc
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippamaggie_Platt
 
Marc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentationMarc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentationMarcEtienne6
 
Confidentiality 9.26.13
Confidentiality 9.26.13Confidentiality 9.26.13
Confidentiality 9.26.13pneville0629
 

Similar to Upholding confidentiality (20)

Privacy & confedentiality
Privacy & confedentialityPrivacy & confedentiality
Privacy & confedentiality
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Hippa final JU nursing informatics
Hippa final JU nursing informaticsHippa final JU nursing informatics
Hippa final JU nursing informatics
 
Patient Confidentiality Training Presentation (1)
Patient Confidentiality Training Presentation (1)Patient Confidentiality Training Presentation (1)
Patient Confidentiality Training Presentation (1)
 
Patient confidentiality MHA 690
Patient confidentiality MHA 690Patient confidentiality MHA 690
Patient confidentiality MHA 690
 
Wk1 discussion 2
Wk1 discussion 2Wk1 discussion 2
Wk1 discussion 2
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Hipaa basics pp2
Hipaa basics pp2Hipaa basics pp2
Hipaa basics pp2
 
Hippa training for healthcare employees
Hippa training for healthcare employeesHippa training for healthcare employees
Hippa training for healthcare employees
 
Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)Sylvia hipaa powerpoint presentation 2010(2)
Sylvia hipaa powerpoint presentation 2010(2)
 
2017 HIPAA Clinical Research Training
2017 HIPAA Clinical Research Training2017 HIPAA Clinical Research Training
2017 HIPAA Clinical Research Training
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
Mha690 health care capstone - confidentiality 9-26-2013
Mha690   health care capstone - confidentiality 9-26-2013Mha690   health care capstone - confidentiality 9-26-2013
Mha690 health care capstone - confidentiality 9-26-2013
 
Sylvia hipaa powerpoint presentation 2010(1)
Sylvia hipaa powerpoint presentation 2010(1)Sylvia hipaa powerpoint presentation 2010(1)
Sylvia hipaa powerpoint presentation 2010(1)
 
Mha690 wk 1 fletcher
Mha690 wk 1   fletcherMha690 wk 1   fletcher
Mha690 wk 1 fletcher
 
Hipaa education
Hipaa educationHipaa education
Hipaa education
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippa
 
Marc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentationMarc etienne week1 discussion2 presentation
Marc etienne week1 discussion2 presentation
 
Confidentiality 9.26.13
Confidentiality 9.26.13Confidentiality 9.26.13
Confidentiality 9.26.13
 

Recently uploaded

HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 

Recently uploaded (20)

HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 

Upholding confidentiality

  • 1. Upholding Confidentiality It is your ethical responsibility Theresa Tapley MHA690: Health Care Capstone Ashford University Dr. David Cole April 23, 2013
  • 2. Objectives  Understanding of HIPAA  Ethical Responsibility to keep each and every patient’s PHI confidential  Patient Privacy Rule and Security Rules  Identification of what PHI is  Ways to protect PHI  Tips for electronic confidentiality protections  Consequences if confidentiality or PHI mishandlement
  • 3. What is Health Insurance Portability and Accountability Act (HIPAA)?  HIPPA is a federal law that gives an individual the right of protection of their personal health information (PHI).  PHI includes all medical and personal information and must be protected whether communication is verbal, written, or electronic. (U.S. Department HHS, 2012)
  • 4. Forms of Sensitive Information Sensitive Information exists in various forms Printed Spoken Electronic It is the responsibility of every employee to protect the privacy and security of sensitive information in ALL forms
  • 5. What Information is Considered Confidential and must be Protected?  Personal billing information  All medical records  Conversations between physician and other medical staff regarding a patient  Information about a patient within their Insurance carrier’s database
  • 6. Patient Privacy Rule Rights  The right to see and obtain a copy of their health record  The right to have corrections added to their personal health record  The right to receive notice about how their health information will be used or shared for certain purposes  The right to get a report of when and why their health information was shared  The right to file a complaint with the provider or health insurer  The right to file a complaint with the U. S. Government
  • 7. Personal Health Information How to keep it confidential  Never leave medical records where others can gain access to them  PHI should be guarded and kept confidential, shared only with healthcare providers involved in their healthcare  PHI is confidential and should not be viewed on paper or on computer by unauthorized staff
  • 8. Ways to Protect Confidentiality of PHI  PHI should only be shared with other healthcare professionals directly involved in an individual’s care  Records are kept locked and only people with a need to see information about patients have access to them  Employees who use computerized patient records to not leave their computers logged in to the patient information system while they are not at their workstations. Computer screens containing patient information are turned away from the view of the public or people passing by.
  • 9. More Ways to Protect Confidentiality of PHI  Posted or written patient information maintained in work areas such as nurses’ stations or front desk is kept covered from the public.  Discussions about patient care are kept private to reduce the likelihood that those who do not need to know will overhear.  Electronic records are kept secure, and the facility monitors who gains access to records to ensure that they are being used appropriately.  Paper records are always shredded or placed in closed receptacles for delivery to a company that destroys records for the facility. They must never be left in the garbage.
  • 10. Understanding the Security Rule  Specifies a series of administrative, physical, and technical safeguards for covered entities to use to assure the confidentiality, integrity, and availability of electronic protected health information  The Security Rule defines “confidentiality” to mean that e-PHI is not available or disclosed to unauthorized persons. The Security Rule's confidentiality requirements support the Privacy Rule's prohibitions against improper uses and disclosures of PHI  The Security rule also promotes the two additional goals of maintaining the integrity and availability of e-PHI  Designation of a security official who is responsible for developing and implement its security policies and procedures
  • 11. Electronic confidentiality protections  Keep passwords and other security features that restrict access to your computer private  Never share password access or log in to the health information system using a borrowed credential
  • 12. More steps for protecting electronic information  Point computer screen away from the public  Never walk away from your computer with PHI up and in view of a passerby  Never remove computer equipment, disks, or software unless instructed to do so by your supervisor  Never send confidential patient information in an e-mail unless it is encrypted  Always double-check the address line of an email before you send it.
  • 13. Penalties for Breaches Breaches of the HIPAA Privacy and Security Rules have serious ramifications for all involved. In addition to sanctions imposed by this organization, such breaches may result in civil and criminal penalties. Statutory and regulatory penalties for breaches may include: Civil: $50,000 per incident, up to $1.5 million per calendar year for violations that are not corrected Criminal: $50,000 to $250,000 in fines and up to 10 years in prison In addition, institutions that fail to correct a HIPAA violation may be fined up to $50,000 per violation.
  • 14. Best Practice Reminders  DO keep computer sign-on codes and passwords secret, and DO NOT allow unauthorized  persons access to your computer. Also, use locked screensavers for added privacy.  DO keep notes, files, memory sticks, and computers in a secure place, and be careful to NOT  leave them in open areas outside your workplace, such as a library, cafeteria, or airport.  DO NOT place PHI or PII on a mobile device without required approval. DO encrypt mobile  devices that contain PHI or PII.  DO hold discussions of PHI in private areas and for job-related reasons only. Also, be aware of  places where others might overhear conversations, such as in reception areas.  DO make certain when mailing documents that no sensitive information is shown on postcards or  through envelope windows, and that envelopes are closed securely.  DO NOT use unsealed campus mail envelopes when sending sensitive information to another  employee.  DO follow procedures for the proper disposal of sensitive information, such as shredding  documents or using locked recycling drop boxes.  When sending an e-mail, DO NOT include PHI or other sensitive information such as Social  Security numbers, unless you have the proper written approval to store the information and  encrypted your computer or e-mail. (UNC, 2013)
  • 15. References HIPAA (n.d.) HIPAA training handbook for the healthcare staff: An introduction to confidentiality and privacy under HIPAA. Retrieved from website: http://www.regalmed.com/pdfs/HIPAA_Handbook.pdf Kongstvedt, P.R. (2007). Essentials of managed health care (5th ed.). MA: Jones and Bartlett Publishers. U.S. Department of Health & Human Services (2012). Health Information Privacy. Retrieved form U.S. Department of Health and Human Services website: http://www.hhs.gov/ocr/privacy/hipaa/understanding/consumers/ind ex.html University of North Carolina (UNC) (2013). HIPAA, privacy, & security. Retrieved from website: http://www.unc.edu/hipaa/Annual%20HIPAA%20Training%20current.p df