SlideShare a Scribd company logo
1 of 19
 Protecting Patients Confidentiality The Health Insurance Portability and Accountability Act of 1996 (HIPAA)
What is HIPAA? A government mandated rule to protect access to and use of patient personal health information Gives patient certain individual rights
What Type of Information Do HIPAA Cover?  Identifiable Protected Health Information (PHI) Information that Identifies a Patient or Individual
Privacy Information What are Identifiable Information?
Answer Pictures Names Birthdates Phone Numbers SSN (social security number) Medical Record Information
Patient’s Rights May review medical record Request correction of any noticeable errors File grievance with provider
Responsibility to Patient Protect and secure PHI (personal health information) Institute policies and procedures for managing PHI
Principles of the Privacy Rule Customer Control Set Boundaries Answerability Civic Accountability Safety
Protected Health Information Policies Guide access to and use of personal health information
Assess to Personal Health Information Is based on who needs to know and minimum necessary information By health care providers By payment activity
Use of Protected Health Information When Providing Patient Health Care Treatment or Services Such as: Verification of insurance Medical treatments
How to Protect Privacy Do not share PHI with non clinical staff Utilize the minimum necessary standard with protected health information Avoid public discussion of patient information Avoid public viewing and access of patient information
When is it allowed to reveal PHI? In court processes (subpoena) Law enforcement processes (criminal investigation)
When is Patient Authorization Required? Receiving Medical Treatment Conducting Medical-Related Tests (AIDS, Drug)
What to Do When Requests are Made for an Individual’s Personal Information Verify who is requesting the information Verify photo (if available) Document the information being given
What Technological System Make It Easy to Access, Copy, and Distribute PHI Computerized Medical Records
Organizations that Enforce HIPAA’S Regulations FBI (federal bureau of investigation) Office for Civil Rights Joint Commission on Accreditation of Healthcare Organization
 For Non-Compliance to HIPAA Security of Privacy rules Civil-Enforced by Office of Civil Rights Criminal-Enforced by Department of Justice Intentionally exposing PHI-1yr sentence & $50,000 fine Falsely accessing PHI-5yr sentence & $100,000 fine Giving PHI to someone with criminal intent-10yr sentence & $250,000 fine
References Mir, S.S. (2011, March). HIPAA Privacy Rule: Maintaining the confidentiality of medical records, Part I. Journal of Health Care Compliance, 13(2), 5-14. Retrieved August 17, 2011, from ABI/INFORM Global  Protecting patients privacy. (n. d.). Retrieved August 17, 2011 from http://cnhs.fiu.edu/ot/pdf/HIPAA_Regulations.ppt   Protecting patient privacy. (n. d.). Retrieved August 17, 2011 from http://www.westernu.edu/bin/nursing/hipaa.pps Wolper, L.F. (2011). Health care administration: Managing organized delivery systems (5th ed.). Boston: Jones and Bartlett.  

More Related Content

What's hot

The importance of confidentiality
The importance of confidentialityThe importance of confidentiality
The importance of confidentiality
swilson0050
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA Basics
Karna *
 
Confidentiality in Healthcare
Confidentiality in HealthcareConfidentiality in Healthcare
Confidentiality in Healthcare
kmasterson
 
Confidentiality in the Workplace
Confidentiality in the WorkplaceConfidentiality in the Workplace
Confidentiality in the Workplace
salvarez63
 

What's hot (20)

Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
The importance of confidentiality
The importance of confidentialityThe importance of confidentiality
The importance of confidentiality
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA Basics
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Privacy & confedentiality
Privacy & confedentialityPrivacy & confedentiality
Privacy & confedentiality
 
Confidentiality in Healthcare
Confidentiality in HealthcareConfidentiality in Healthcare
Confidentiality in Healthcare
 
MODULE 8 - PRIVACY AND CONFIDENTIALITY
MODULE 8 - PRIVACY AND CONFIDENTIALITYMODULE 8 - PRIVACY AND CONFIDENTIALITY
MODULE 8 - PRIVACY AND CONFIDENTIALITY
 
Confidentiality
Confidentiality Confidentiality
Confidentiality
 
Presentation hippa
Presentation hippaPresentation hippa
Presentation hippa
 
SCHS Topic 5: Privacy, Confidentiality and Medical Records
SCHS Topic 5: Privacy, Confidentiality and Medical RecordsSCHS Topic 5: Privacy, Confidentiality and Medical Records
SCHS Topic 5: Privacy, Confidentiality and Medical Records
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Lecture 13 privacy, confidentiality and medical records
Lecture 13 privacy, confidentiality and medical recordsLecture 13 privacy, confidentiality and medical records
Lecture 13 privacy, confidentiality and medical records
 
Confidentiality
Confidentiality Confidentiality
Confidentiality
 
Confidentiality in the Workplace
Confidentiality in the WorkplaceConfidentiality in the Workplace
Confidentiality in the Workplace
 
Patient Privacy and Safety in Healthcare
Patient Privacy and Safety in HealthcarePatient Privacy and Safety in Healthcare
Patient Privacy and Safety in Healthcare
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
HIPAA & PHI Training
HIPAA & PHI TrainingHIPAA & PHI Training
HIPAA & PHI Training
 
Hippa 2021
Hippa 2021Hippa 2021
Hippa 2021
 
Hippa
HippaHippa
Hippa
 

Viewers also liked (6)

Upholding confidentiality
Upholding confidentialityUpholding confidentiality
Upholding confidentiality
 
Protecting patient privacy and confidentiality
Protecting patient privacy and confidentialityProtecting patient privacy and confidentiality
Protecting patient privacy and confidentiality
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Induction Slideshow Privacy And Confidentiality
Induction Slideshow  Privacy And ConfidentialityInduction Slideshow  Privacy And Confidentiality
Induction Slideshow Privacy And Confidentiality
 
Medical ethics
Medical ethicsMedical ethics
Medical ethics
 
Medico legal case
Medico legal caseMedico legal case
Medico legal case
 

Similar to Protecting patients confidentiality slide presentation

Hipaa basics pp2
Hipaa basics pp2Hipaa basics pp2
Hipaa basics pp2
martykoepke
 
Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentiality
Lily Isaacson
 
HIPPA---Chantel Artis Spencer
HIPPA---Chantel Artis SpencerHIPPA---Chantel Artis Spencer
HIPPA---Chantel Artis Spencer
shay1234
 
HIPAA and RHIOs
HIPAA and RHIOsHIPAA and RHIOs
HIPAA and RHIOs
nobumoto
 
Week 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy trainingWeek 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy training
vrgill22
 
Hippa and Confidentiality
Hippa and ConfidentialityHippa and Confidentiality
Hippa and Confidentiality
ramonapage
 

Similar to Protecting patients confidentiality slide presentation (20)

Patient confidentiality training
Patient confidentiality trainingPatient confidentiality training
Patient confidentiality training
 
Protecting patients privacy slide presentation
Protecting patients privacy slide presentationProtecting patients privacy slide presentation
Protecting patients privacy slide presentation
 
Patient confidentiality training
Patient confidentiality trainingPatient confidentiality training
Patient confidentiality training
 
Mha690 week 1 disc2 10 3-2019
Mha690 week 1 disc2 10 3-2019Mha690 week 1 disc2 10 3-2019
Mha690 week 1 disc2 10 3-2019
 
Hipaa basics pp2
Hipaa basics pp2Hipaa basics pp2
Hipaa basics pp2
 
Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentiality
 
Hipaa inservice
Hipaa inserviceHipaa inservice
Hipaa inservice
 
HIPPA---Chantel Artis Spencer
HIPPA---Chantel Artis SpencerHIPPA---Chantel Artis Spencer
HIPPA---Chantel Artis Spencer
 
HIPAA 2010
HIPAA  2010HIPAA  2010
HIPAA 2010
 
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)
 
HIPAA
HIPAAHIPAA
HIPAA
 
HIPAA and RHIOs
HIPAA and RHIOsHIPAA and RHIOs
HIPAA and RHIOs
 
Week 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy trainingWeek 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy training
 
HIPAA INSERVICE 2017
HIPAA INSERVICE 2017 HIPAA INSERVICE 2017
HIPAA INSERVICE 2017
 
Hippa and Confidentiality
Hippa and ConfidentialityHippa and Confidentiality
Hippa and Confidentiality
 
Hippa
HippaHippa
Hippa
 
HIPAA Laws
HIPAA LawsHIPAA Laws
HIPAA Laws
 
Mha 690 w1 d2
Mha 690 w1 d2Mha 690 w1 d2
Mha 690 w1 d2
 
HIPAA
HIPAAHIPAA
HIPAA
 
HIPAA
HIPAAHIPAA
HIPAA
 

Recently uploaded

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 

Protecting patients confidentiality slide presentation

  • 1. Protecting Patients Confidentiality The Health Insurance Portability and Accountability Act of 1996 (HIPAA)
  • 2. What is HIPAA? A government mandated rule to protect access to and use of patient personal health information Gives patient certain individual rights
  • 3. What Type of Information Do HIPAA Cover? Identifiable Protected Health Information (PHI) Information that Identifies a Patient or Individual
  • 4. Privacy Information What are Identifiable Information?
  • 5. Answer Pictures Names Birthdates Phone Numbers SSN (social security number) Medical Record Information
  • 6. Patient’s Rights May review medical record Request correction of any noticeable errors File grievance with provider
  • 7. Responsibility to Patient Protect and secure PHI (personal health information) Institute policies and procedures for managing PHI
  • 8. Principles of the Privacy Rule Customer Control Set Boundaries Answerability Civic Accountability Safety
  • 9. Protected Health Information Policies Guide access to and use of personal health information
  • 10. Assess to Personal Health Information Is based on who needs to know and minimum necessary information By health care providers By payment activity
  • 11. Use of Protected Health Information When Providing Patient Health Care Treatment or Services Such as: Verification of insurance Medical treatments
  • 12. How to Protect Privacy Do not share PHI with non clinical staff Utilize the minimum necessary standard with protected health information Avoid public discussion of patient information Avoid public viewing and access of patient information
  • 13. When is it allowed to reveal PHI? In court processes (subpoena) Law enforcement processes (criminal investigation)
  • 14. When is Patient Authorization Required? Receiving Medical Treatment Conducting Medical-Related Tests (AIDS, Drug)
  • 15. What to Do When Requests are Made for an Individual’s Personal Information Verify who is requesting the information Verify photo (if available) Document the information being given
  • 16. What Technological System Make It Easy to Access, Copy, and Distribute PHI Computerized Medical Records
  • 17. Organizations that Enforce HIPAA’S Regulations FBI (federal bureau of investigation) Office for Civil Rights Joint Commission on Accreditation of Healthcare Organization
  • 18. For Non-Compliance to HIPAA Security of Privacy rules Civil-Enforced by Office of Civil Rights Criminal-Enforced by Department of Justice Intentionally exposing PHI-1yr sentence & $50,000 fine Falsely accessing PHI-5yr sentence & $100,000 fine Giving PHI to someone with criminal intent-10yr sentence & $250,000 fine
  • 19. References Mir, S.S. (2011, March). HIPAA Privacy Rule: Maintaining the confidentiality of medical records, Part I. Journal of Health Care Compliance, 13(2), 5-14. Retrieved August 17, 2011, from ABI/INFORM Global Protecting patients privacy. (n. d.). Retrieved August 17, 2011 from http://cnhs.fiu.edu/ot/pdf/HIPAA_Regulations.ppt   Protecting patient privacy. (n. d.). Retrieved August 17, 2011 from http://www.westernu.edu/bin/nursing/hipaa.pps Wolper, L.F. (2011). Health care administration: Managing organized delivery systems (5th ed.). Boston: Jones and Bartlett.