SlideShare a Scribd company logo
1 of 13
Protecting Patient’s Privacy:
UCLA’s Training Guide
Threat From Within
• Sometimes good employees don’t follow policies and
procedures
• Inadvertent misuse of data by employees topped the
list of breaches in 2013
• 42 % of employees have received training
• 57 % said they didn’t know their organizations
security policies
• Organizations MUST have policies and procedures
and train staff about them
• Staff then need to be tested about what they have
absorbed in the training
Technology
• Technology has exploded with reference to
storing, communicating, and referencing
medical information
It enhances patient care......BUT
What are the Ethical-Legal Implications???
Staff Need To Be Made Aware of Their Role
What Information Do You Need?
• Physicians, technologists, and other
healthcare professional use technology for
disease management and treatment options
• Access is broadened to permit links from
associations
• Information about medical information can be
retrieved, copied and retransmitted by anyone
with access and a password
HIPAA Privacy Rule: It will guide
you
• The Health Insurance Portability and
Accountability Act of 1996 was created to
safeguard electronic healthcare transactions
• The Privacy Rule was enacted in 2003
Privacy Rule Security Rule
• Protects patients privacy
and provides patients
access tot their medical
records
• Formal policies and
procedures to regulate
conduct of personnel
protecting data
Understanding the Purpose of
HIPAA???
• Balance protecting the privacy of patients’
health information and making sure the
information to health care workers to provide
care and payment for care
• A Covered Entity (CE): Is facility AND STAFF
• Only the MINIMUM amount of PHI needed to
accomplish for the intended use, disclosure or
request should be used
IT’S THE CONSTITUTION
Congress Mandates:
“The Privacy Of An Individual Is Directly Affected
By The Collection, Maintenance, Use AND
Dissemination of PERSONAL INFORMATION!”
The Right to Privacy is
an Individuals Constitutional Right!
Ethical and Legal Considerations
for Your Staff
• Ethics sets the behavioral standards by moral
values
• Law is an objective rule of conduct or action
The HealthCare Professional MUST:
Respect Autonomy (respect others decision making)
Beneficence (help others reach their interests)
No maleficence (do no harm)
Justice (all people deserve the same treatment)
Planning
• A manager needs to set goals, outline, costs,
desired results, impact on other systems,
vendor selection, and setting priorities
Know your systems
Know what needs to be added
to your system
What changes need to be made
to the current program?
What Training Should Be Put In
Place?
• Create a culture of compliance
• Ensure there is policy awareness
• Discuss incident response and risk analysis
• The training sessions should include the difference
between “ignorance” and “willful neglect”
• There will be online education of HIPAA Security and
Privacy Rules with a questionnaire of staff
knowledge at the end on an annual basis
• Staff will sign an attestation of their
commitment to patient privacy
Steps To Train
1. Training will be part of orientation of new hires
2. Annual training will be required for all staff
3. Develop a program that perpetuates itself and becomes part of
the organizational culture
4. Training is education of the knowledge, how-to’s, and ongoing
awareness
5. PHI should be covered in verbal, written, and electronic forms
6. Communication process for questions after training
7. Repertoire accessible for up to date policies and procedures
8. Have a process for evaluating the training programs effectiveness,
reliability, and validity
9. Have a verification process for security awareness training before
receiving access to PHI
How will the training be deemed
effective?
• Give periodic quizzes to follow up training
• Distribute a privacy and security awareness survey
• Send follow-up questionnaires to those who attended the
training 4 to 6 months following the training
• Monitor the number of compliance infractions
• Measure privacy and security knowledge as part of the
yearly performance evaluation
• Place feedback and suggestion forms on the
organization intranet
• Track the number and type of privacy and
security incidents that occur before and
after training
References
AHIMA. (2010). HIPAA Privacy and security training (updated).
Retrieved from http://library.ahima.org/xpedio/groups/public/
documents/ahima/bok1_048509.hcsp?dDocName=bok1_048509.
Cascardo, D. (2013). What to do before the Office for Civil Rights
comes knocking-Part 2. Podiatry Management, 32(8), 169-174.
Herold, R., & Beaver, K. (2015). The practical guide to HIPAA Privacy
and Security compliance (2nd Ed.). Taylor & Francis Group: Boca
Raton, FL.
Polito, J. (2012). Ethical considerations in Internet use of electronic
protected health information. Neurodiagm Journal, 52(1), 34-41.
Zamosky, L. (2014). Avoid the breach: Put data security measures in
place. Physician Executive, 40(4), 82-84.

More Related Content

Viewers also liked

darins resume jun 2016
darins resume jun 2016darins resume jun 2016
darins resume jun 2016Darin Doerel
 
Digital Signage Presentation For Via Satellite
Digital Signage Presentation For Via SatelliteDigital Signage Presentation For Via Satellite
Digital Signage Presentation For Via SatelliteDavid Drain
 
Інна Козак — Швидке опанування англійської мови для роботи в ІТ
Інна Козак — Швидке опанування англійської мови для роботи в ІТІнна Козак — Швидке опанування англійської мови для роботи в ІТ
Інна Козак — Швидке опанування англійської мови для роботи в ІТITDayLutsk
 
Δραστηριότητα στον Κειμενογράφο
Δραστηριότητα στον ΚειμενογράφοΔραστηριότητα στον Κειμενογράφο
Δραστηριότητα στον ΚειμενογράφοPenelope Markellou
 
Φάκελος για το γράμμα στον Άγιο Βασίλη (έκδοση 2).
Φάκελος για το γράμμα στον Άγιο Βασίλη (έκδοση 2).Φάκελος για το γράμμα στον Άγιο Βασίλη (έκδοση 2).
Φάκελος για το γράμμα στον Άγιο Βασίλη (έκδοση 2).Penelope Markellou
 

Viewers also liked (11)

Diccionario de informatica
Diccionario de informaticaDiccionario de informatica
Diccionario de informatica
 
L8 cyberbullying
L8 cyberbullyingL8 cyberbullying
L8 cyberbullying
 
Sesion05 06 07
Sesion05 06 07Sesion05 06 07
Sesion05 06 07
 
darins resume jun 2016
darins resume jun 2016darins resume jun 2016
darins resume jun 2016
 
Digital Signage Presentation For Via Satellite
Digital Signage Presentation For Via SatelliteDigital Signage Presentation For Via Satellite
Digital Signage Presentation For Via Satellite
 
TIPS-v6
TIPS-v6TIPS-v6
TIPS-v6
 
Інна Козак — Швидке опанування англійської мови для роботи в ІТ
Інна Козак — Швидке опанування англійської мови для роботи в ІТІнна Козак — Швидке опанування англійської мови для роботи в ІТ
Інна Козак — Швидке опанування англійської мови для роботи в ІТ
 
Δραστηριότητα στον Κειμενογράφο
Δραστηριότητα στον ΚειμενογράφοΔραστηριότητα στον Κειμενογράφο
Δραστηριότητα στον Κειμενογράφο
 
Φάκελος για το γράμμα στον Άγιο Βασίλη (έκδοση 2).
Φάκελος για το γράμμα στον Άγιο Βασίλη (έκδοση 2).Φάκελος για το γράμμα στον Άγιο Βασίλη (έκδοση 2).
Φάκελος για το γράμμα στον Άγιο Βασίλη (έκδοση 2).
 
"To Σωστό Βιογραφικό Σημείωμα" από τη CVexperts
"To Σωστό Βιογραφικό Σημείωμα" από τη CVexperts"To Σωστό Βιογραφικό Σημείωμα" από τη CVexperts
"To Σωστό Βιογραφικό Σημείωμα" από τη CVexperts
 
3 Ζωα
3 Ζωα3 Ζωα
3 Ζωα
 

Similar to Week1discussioncapstone

Confidentiality in the healthcare system
Confidentiality in the healthcare systemConfidentiality in the healthcare system
Confidentiality in the healthcare systempfor2012
 
Privacy Compliance
Privacy CompliancePrivacy Compliance
Privacy Compliancemghuff
 
MHA 690 : Confidentiality
MHA 690 : Confidentiality  MHA 690 : Confidentiality
MHA 690 : Confidentiality Charlotte Austin
 
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...M2SYS Technology
 
Pateint safety bonafide administration
Pateint safety bonafide administrationPateint safety bonafide administration
Pateint safety bonafide administrationLatha Venkatesan
 
Marlene brooks week 1 discussion 2 - confidentiality
Marlene brooks   week 1 discussion 2 - confidentialityMarlene brooks   week 1 discussion 2 - confidentiality
Marlene brooks week 1 discussion 2 - confidentialitybablot33
 
Discussion2
Discussion2 Discussion2
Discussion2 amberlinn
 
Mha 690 discussion 2 Seynabou
Mha 690 discussion 2 SeynabouMha 690 discussion 2 Seynabou
Mha 690 discussion 2 SeynabouSeynaboundiaye
 
Standards and Best Practices for Confidentiality of Electronic Health Records
Standards and Best Practices for Confidentiality of Electronic Health RecordsStandards and Best Practices for Confidentiality of Electronic Health Records
Standards and Best Practices for Confidentiality of Electronic Health RecordsMEASURE Evaluation
 
Leading your HIPAA Compliance Culture in 2016
Leading your HIPAA Compliance Culture in 2016Leading your HIPAA Compliance Culture in 2016
Leading your HIPAA Compliance Culture in 2016Lance King
 
Onc safer guides to safe ehr jan302014_ppt
Onc safer guides to safe ehr jan302014_pptOnc safer guides to safe ehr jan302014_ppt
Onc safer guides to safe ehr jan302014_pptKristenReiter3
 
SoCal HIMMS Policiy Initiatives
SoCal HIMMS Policiy InitiativesSoCal HIMMS Policiy Initiatives
SoCal HIMMS Policiy InitiativesTimothyEdwardJones
 
Homework AssignmentShort Answer Responses.1. Describe the fiv.docx
Homework AssignmentShort Answer Responses.1.  Describe the fiv.docxHomework AssignmentShort Answer Responses.1.  Describe the fiv.docx
Homework AssignmentShort Answer Responses.1. Describe the fiv.docxadampcarr67227
 
The Ethical Library Worker
The Ethical Library WorkerThe Ethical Library Worker
The Ethical Library WorkerCILIP Ireland
 
Patient confidentiality training
Patient confidentiality trainingPatient confidentiality training
Patient confidentiality trainingpburton60
 
Security compentency s lideshare july 2015
Security compentency s lideshare july 2015Security compentency s lideshare july 2015
Security compentency s lideshare july 2015Patrick Doyle
 
HIPAA and Confidentiality
HIPAA and ConfidentialityHIPAA and Confidentiality
HIPAA and ConfidentialityReggie2469
 
Privacy and Security Tiger Team Authentication Recommendations
Privacy and Security Tiger Team Authentication RecommendationsPrivacy and Security Tiger Team Authentication Recommendations
Privacy and Security Tiger Team Authentication RecommendationsBrian Ahier
 
Healthcare capston db 2 wk 1 training on confidentiality
Healthcare capston db 2 wk 1 training on confidentialityHealthcare capston db 2 wk 1 training on confidentiality
Healthcare capston db 2 wk 1 training on confidentialityPA219
 

Similar to Week1discussioncapstone (20)

Confidentiality in the healthcare system
Confidentiality in the healthcare systemConfidentiality in the healthcare system
Confidentiality in the healthcare system
 
Privacy Compliance
Privacy CompliancePrivacy Compliance
Privacy Compliance
 
MHA 690 : Confidentiality
MHA 690 : Confidentiality  MHA 690 : Confidentiality
MHA 690 : Confidentiality
 
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
 
Pateint safety bonafide administration
Pateint safety bonafide administrationPateint safety bonafide administration
Pateint safety bonafide administration
 
Marlene brooks week 1 discussion 2 - confidentiality
Marlene brooks   week 1 discussion 2 - confidentialityMarlene brooks   week 1 discussion 2 - confidentiality
Marlene brooks week 1 discussion 2 - confidentiality
 
Discussion2
Discussion2 Discussion2
Discussion2
 
Mha 690 discussion 2 Seynabou
Mha 690 discussion 2 SeynabouMha 690 discussion 2 Seynabou
Mha 690 discussion 2 Seynabou
 
Standards and Best Practices for Confidentiality of Electronic Health Records
Standards and Best Practices for Confidentiality of Electronic Health RecordsStandards and Best Practices for Confidentiality of Electronic Health Records
Standards and Best Practices for Confidentiality of Electronic Health Records
 
Leading your HIPAA Compliance Culture in 2016
Leading your HIPAA Compliance Culture in 2016Leading your HIPAA Compliance Culture in 2016
Leading your HIPAA Compliance Culture in 2016
 
HIPAA
HIPAAHIPAA
HIPAA
 
Onc safer guides to safe ehr jan302014_ppt
Onc safer guides to safe ehr jan302014_pptOnc safer guides to safe ehr jan302014_ppt
Onc safer guides to safe ehr jan302014_ppt
 
SoCal HIMMS Policiy Initiatives
SoCal HIMMS Policiy InitiativesSoCal HIMMS Policiy Initiatives
SoCal HIMMS Policiy Initiatives
 
Homework AssignmentShort Answer Responses.1. Describe the fiv.docx
Homework AssignmentShort Answer Responses.1.  Describe the fiv.docxHomework AssignmentShort Answer Responses.1.  Describe the fiv.docx
Homework AssignmentShort Answer Responses.1. Describe the fiv.docx
 
The Ethical Library Worker
The Ethical Library WorkerThe Ethical Library Worker
The Ethical Library Worker
 
Patient confidentiality training
Patient confidentiality trainingPatient confidentiality training
Patient confidentiality training
 
Security compentency s lideshare july 2015
Security compentency s lideshare july 2015Security compentency s lideshare july 2015
Security compentency s lideshare july 2015
 
HIPAA and Confidentiality
HIPAA and ConfidentialityHIPAA and Confidentiality
HIPAA and Confidentiality
 
Privacy and Security Tiger Team Authentication Recommendations
Privacy and Security Tiger Team Authentication RecommendationsPrivacy and Security Tiger Team Authentication Recommendations
Privacy and Security Tiger Team Authentication Recommendations
 
Healthcare capston db 2 wk 1 training on confidentiality
Healthcare capston db 2 wk 1 training on confidentialityHealthcare capston db 2 wk 1 training on confidentiality
Healthcare capston db 2 wk 1 training on confidentiality
 

Recently uploaded

Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 

Recently uploaded (20)

Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 

Week1discussioncapstone

  • 2. Threat From Within • Sometimes good employees don’t follow policies and procedures • Inadvertent misuse of data by employees topped the list of breaches in 2013 • 42 % of employees have received training • 57 % said they didn’t know their organizations security policies • Organizations MUST have policies and procedures and train staff about them • Staff then need to be tested about what they have absorbed in the training
  • 3. Technology • Technology has exploded with reference to storing, communicating, and referencing medical information It enhances patient care......BUT What are the Ethical-Legal Implications??? Staff Need To Be Made Aware of Their Role
  • 4. What Information Do You Need? • Physicians, technologists, and other healthcare professional use technology for disease management and treatment options • Access is broadened to permit links from associations • Information about medical information can be retrieved, copied and retransmitted by anyone with access and a password
  • 5. HIPAA Privacy Rule: It will guide you • The Health Insurance Portability and Accountability Act of 1996 was created to safeguard electronic healthcare transactions • The Privacy Rule was enacted in 2003 Privacy Rule Security Rule • Protects patients privacy and provides patients access tot their medical records • Formal policies and procedures to regulate conduct of personnel protecting data
  • 6. Understanding the Purpose of HIPAA??? • Balance protecting the privacy of patients’ health information and making sure the information to health care workers to provide care and payment for care • A Covered Entity (CE): Is facility AND STAFF • Only the MINIMUM amount of PHI needed to accomplish for the intended use, disclosure or request should be used
  • 7. IT’S THE CONSTITUTION Congress Mandates: “The Privacy Of An Individual Is Directly Affected By The Collection, Maintenance, Use AND Dissemination of PERSONAL INFORMATION!” The Right to Privacy is an Individuals Constitutional Right!
  • 8. Ethical and Legal Considerations for Your Staff • Ethics sets the behavioral standards by moral values • Law is an objective rule of conduct or action The HealthCare Professional MUST: Respect Autonomy (respect others decision making) Beneficence (help others reach their interests) No maleficence (do no harm) Justice (all people deserve the same treatment)
  • 9. Planning • A manager needs to set goals, outline, costs, desired results, impact on other systems, vendor selection, and setting priorities Know your systems Know what needs to be added to your system What changes need to be made to the current program?
  • 10. What Training Should Be Put In Place? • Create a culture of compliance • Ensure there is policy awareness • Discuss incident response and risk analysis • The training sessions should include the difference between “ignorance” and “willful neglect” • There will be online education of HIPAA Security and Privacy Rules with a questionnaire of staff knowledge at the end on an annual basis • Staff will sign an attestation of their commitment to patient privacy
  • 11. Steps To Train 1. Training will be part of orientation of new hires 2. Annual training will be required for all staff 3. Develop a program that perpetuates itself and becomes part of the organizational culture 4. Training is education of the knowledge, how-to’s, and ongoing awareness 5. PHI should be covered in verbal, written, and electronic forms 6. Communication process for questions after training 7. Repertoire accessible for up to date policies and procedures 8. Have a process for evaluating the training programs effectiveness, reliability, and validity 9. Have a verification process for security awareness training before receiving access to PHI
  • 12. How will the training be deemed effective? • Give periodic quizzes to follow up training • Distribute a privacy and security awareness survey • Send follow-up questionnaires to those who attended the training 4 to 6 months following the training • Monitor the number of compliance infractions • Measure privacy and security knowledge as part of the yearly performance evaluation • Place feedback and suggestion forms on the organization intranet • Track the number and type of privacy and security incidents that occur before and after training
  • 13. References AHIMA. (2010). HIPAA Privacy and security training (updated). Retrieved from http://library.ahima.org/xpedio/groups/public/ documents/ahima/bok1_048509.hcsp?dDocName=bok1_048509. Cascardo, D. (2013). What to do before the Office for Civil Rights comes knocking-Part 2. Podiatry Management, 32(8), 169-174. Herold, R., & Beaver, K. (2015). The practical guide to HIPAA Privacy and Security compliance (2nd Ed.). Taylor & Francis Group: Boca Raton, FL. Polito, J. (2012). Ethical considerations in Internet use of electronic protected health information. Neurodiagm Journal, 52(1), 34-41. Zamosky, L. (2014). Avoid the breach: Put data security measures in place. Physician Executive, 40(4), 82-84.

Editor's Notes

  1. (Zamosky, 2014)
  2. Patients have the right to obtain and control their medical records, including who gets to see them (). Who is responsible for maintaining confidentiality? How will confidentiality be monitored? Who will be accountable for breeches and to what degree (Polito, 2012).
  3. (Polito, 2012)
  4. Moreover, the Security Rule sets physical safeguards (protecting computer systems and network systems from physical intrusion and hazards), technical security services (regulates the safety and security of stored data on a network), and technical security mechanisms (for encryption of PHI (protected health information) (Polito, 2012).
  5. (Polito, 2012)
  6. (Polito, 2012)
  7. (Cascade, 2013)
  8. (AHIMA, 2010)
  9. (Herold & Beaver, 2015).