Training on confidentiality MHA690 Hayden


Published on

Published in: Education
1 Like
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Training on confidentiality MHA690 Hayden

  1. 1. Mandatory Training on confidentiality (HIPPA) Health Insurance Portability and Accountability Act Training on confidentiality Sandra Hayden, B.S., R.T.(T) For MHA690 December 9, 2010
  2. 2. <ul><li>HIPAA stands for Health Insurance Portability and Accountability Act of 1996 and is composed of three components: Insurance portability, fraud enforcement, and administrative simplification. This session will focus on the Security Rule section of HIPAA and the responsibilities of units or entities to protect and safeguard the confidentiality of PHI that is either created, maintained, and transmitted in electronic form. </li></ul>Welcome to HIPAA Security Training
  3. 3. The goals for this training session are: <ul><li>Increase your knowledge and understanding of what is protected health information (PHI) and how to maintain its security. </li></ul><ul><li>Enhance your awareness of your role in assisting in following the HIPAA Security Rule. </li></ul><ul><li>Learn about privacy and the security of information created, maintained, and transmitted in electronic format. </li></ul><ul><li>Inform the workforce about their reporting responsibilities for HIPAA violations and the possible penalties for violation of HIPAA law for both you and the this hospital. </li></ul><ul><li>Protect the confidentiality and security of PHI. </li></ul><ul><li>Not only will the information you learn today help you here in your job, but it will also help you become an informed consumer of health care services. </li></ul>
  4. 4. Why did the need for accountability and administrative simplification come about? <ul><li>The increasing use of the internet, involving the storing and transferring of electronic information, advances in genetic science, and the concern about WHO would have access to WHAT information, and HOW it would be used generated concern. </li></ul>
  5. 5. <ul><li>Protected Health Information (PHI) is individually identifiable health information that is held or disclosed by a covered entity that can be communicated electronically, verbally, or written. </li></ul><ul><li>Electronic Protected Health Information (EPHI) is protected health information (PHI) that is transmitted by electronic media or maintained by electronic media. </li></ul><ul><li>Sensitive Data is protected health information that can be used to determine the identity of an individual and/or their diagnosis </li></ul>The Security Rule
  6. 6. <ul><li>Follow the fundamentals of secure password management </li></ul><ul><li>Remember Security impacts privacy </li></ul><ul><li>Adhere to Policies and Procedures regarding safeguarding buildings, systems, and information </li></ul><ul><li>Report any suspected violations of policies and procedures to your Unit Security Officer, and </li></ul><ul><li>Employ daily work habits that protect the security and privacy of information you have access to in your responsibilities </li></ul><ul><li>These are practices that we all can support and implement to safeguard the security and confidentiality of EPHI at our organization. </li></ul>The following are key practices to remember and implement to do your part in safeguarding the security and confidentiality of Electronic Protected Health Information:
  7. 7. It is YOUR responsibility to safeguard information <ul><li>We must ALL protect the security and integrity of PHI information by implementing a process to assist with anticipating reasonable threats or hazards and protect against use or disclosure of EPHI that is not permitted or required under the Privacy Rule. In addition, we must as an organization ensure and monitor compliance with the Security Rule by our faculty, staff, and students. </li></ul>
  8. 8. What does access mean? <ul><li>What does access mean? Access is when someone has the ability or the means by which to communicate Protected Health Information (PHI) through the use of a system resource that creates, maintains, or transmits information in an electronic format. An example of this would be PHI that is stored on your local hard drive as an email or in a local database as well as those stored on a shared system. </li></ul>
  9. 9. Actions you need to take <ul><li>If you see a medical record in public view where patients or others can see it, cover the file, turn it over, or find another way to protect it. </li></ul><ul><li>When you talk about patients, try to prevent others from overhearing the conversation. Whenever possible, hold conversations about patients in private areas. Do not discuss patients while you are in elevators or other public areas. </li></ul><ul><li>When medical records are not in use, store them in offices, shelves or filing cabinets. </li></ul><ul><li>Remove patient documents from faxes and copiers as soon as you can. </li></ul><ul><li>When you throw away documents containing PHI, follow the procedures for disposal of documents with PHI. </li></ul>
  10. 10. Use Only the Minimum Necessary Information <ul><li>When you use PHI, you must follow the Privacy Rule's minimum necessary requirement by asking yourself the following question: &quot;Am I using or accessing more PHI than I need to?&quot; </li></ul>
  11. 11. <ul><li>Three employees continued to look at the confidential records of a celebrity. </li></ul><ul><li>What happened to the employees who violated the HIPPA? They were either terminated, suspended and or received warnings/ disciplinary actions. </li></ul><ul><li>After further investigations all employees found to have breached patient confidentiality were disciplined or fired. </li></ul><ul><li>Reference: Over 120 UCLA Hospital staff saw celebrity health records.  Retrieved July 20, 2010 from,2933,398784,00.html. </li></ul>True Case Scenario: Hospital staff saw celebrity health records.
  12. 12. <ul><li>According to An, Ranji, and Salganicoff (2008), privacy is a major challenge to consider when adopting broad health IT within the public arena.  </li></ul><ul><li>The Health Insurance Portability and Accountability Act (HIPAA) of 1996 established guidelines and regulations for the use and disclosure of information about patients’ records (An, et al., 2008). </li></ul><ul><li>HIPAA also has safeguards for unauthorized access to information. HIPAA also requires that electronic health transactions be standardized to improve the efficiency and effectiveness in the United State’s health care system via strengthening the use of electronic data (An, et al., 2008). </li></ul><ul><li>It is your job to safeguard patient information. </li></ul><ul><li>Reference: An, J., Ranji, U., & Salganicoff, A. (2008). Health information technology (Issue Module). Retrieved from The Kaiser Family Foundation website:‌topics_im.asp?id=655&imID=1&parentID=70 </li></ul>Literature Review
  13. 13. Literature Review (continued) <ul><li>According to Kongstvedt (2007), in 2003 The U.S. Department of Health and Human Services (HHS) Office for Civil Rights (OCR) is responsible for enforcing the Privacy and Security Rules enforcement of HIPAA. The OCR's enforcement activities have obtained significant results that have improved the privacy practices of covered entities.  The corrective actions obtained by OCR from covered entities have resulted in systemic change that has improved the privacy protection of health information for all individuals they serve. </li></ul><ul><li>Reference: Kongstvedt, P. R. (2007). Essentials of managed health care . Sudbury, MA: Jones and Bartlett. </li></ul>
  14. 14. Ready for the Quiz?
  15. 15. <ul><li>You overhear two hospital employees discussing a patient in the elevator. What do you do? </li></ul><ul><li>A. Remind them to respect patient confidentiality and/or obtain their names from their name badges and inform your supervisor. B. Join in the conversation only if you know about the patient. C. Ignore the employees and forget what you've heard them talking about. </li></ul><ul><li>Correct answer: A </li></ul>
  16. 16. <ul><li>You forget your password and need access to patient information to do your job. What do you do? A. Call Information Services help desk or your network administrator to reinstate your password. B. Share your coworker's password until you have time to obtain another password. C. None of the above. Correct answer: A </li></ul>
  17. 17. <ul><li>You walk up to a computer workstation and notice that the previous user has not logged out. What do you do? A. Send email from the user's account. B. Log the user out and sign in your own USER ID and password. C. Save time by accessing the information you need to do your job on the current screen. Correct answer: B </li></ul>
  18. 18. <ul><li>You walk away from my computer on your desk without logging out. Another employee starts using your computer and, using your access, inappropriately looks up patient information out of curiosity. Are you held accountable? A. Yes. B. No. C. Only if the patient complains. Correct answer: A </li></ul>
  19. 19. <ul><li>As a health care employee on our team, you are required to know about the health information privacy requirements of a federal law called HIPAA (Health Insurance Portability and Accountability Act. </li></ul><ul><li>You are covered by the Privacy Rule as a member of the facility's workforce. You must follow all policies and procedures, including those concerning health information privacy. </li></ul><ul><li>Thank you for taking time to learn about the HIPAA Privacy Rule. </li></ul>Summary