2. Introduction
• There should never be a case where nurses or
any other hospital worker are looking at
patients records other than there patient they
are working on. If anyone are found in
violation of this law they should have
immediate action taken against them. Just
because a person is a celebrity that doesn’t
mean their personal lives should be violated
3. HIPPA
• “The Health Insurance Portability and Accountability
Act of 1996 (HIPAA; Pub.L. 104-191, 110 Stat. 1936,
enacted August 21, 1996) was enacted by the United
States Congress and signed by President Bill Clinton in
1996. Title I of HIPAA protects health
insurance coverage for workers and their families when
they change or lose their jobs. Title II of HIPAA, known
as the Administrative Simplification (AS) provisions,
requires the establishment of national standards
for electronic health care transactions and national
identifiers for providers, health insurance plans, and
employers”.
4. Hitech
• “The Health Information Technology for
Economic and Clinical Health (HITECH) Act,
enacted as part of the American Recovery and
Reinvestment Act of 2009, was signed into law
on February 17, 2009, to promote the
adoption and meaningful use of health
information technology”.
5. Security Rule
• “The HIPAA Security Rule establishes national
standards to protect individuals’ electronic
personal health information that is created,
received, used, or maintained by a covered
entity”
6. Penalties
• Fines
• Jail time
• Loss of license to practice
• Public humiliation
• Job loss
7. Training
• Making sure that people have read and signed
the Privacy and security acts are step 1.
• Next having quarterly meetings to reinstate
what was signed and make sure everyone is
following rules is step 2
• Step 3 would be to set up monthly security
checks on public use computers of patient
records
8. Training
• You want people to understand that you are serious
about the laws and will not take things lightly if laws
are broken.
• Keeping accurate records on who works with each
patient is a must.
• Doing checks to make sure everyone is where they
should be is a must as well
• Finally creating pass codes for each patient that only
the team that is working with them will know and use
will be a great idea. If codes are used under another
nurse or doctors name it should flag the system.
9. Preventive Methods
• For employees ways to make sure they are not in
violation is to make sure they stay on only task
assigned. If someone needs help make sure
proper steps are taken. It is ok to ask questions
to make sure you are in the right. Also logging off
your computers properly will make sure that
nobody else is working under your name. Also
not sharing your pass words with anyone is a
must. Every three months it is good to change
your pass code to make sure nobody is using your
account access.
10. References
• Wolper, L.F. (2011). Health care
administration: Managing organized delivery
systems (5th ed.). Sudbury, MA: Jones and
Bartlett Publishers, Inc
• http://www.hhs.gov/ocr/privacy/hipaa/admin
istrative/securityrule/index.html